In Octopus Deploy 2.0 and later before 2018.3.7, an authenticated user, with variable edit permissions, can scope some variables to targets greater than their permissions should allow. In other words, they can see machines beyond their team's scoped environments.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://github.com/OctopusDeploy/Issues/issues/4407 | third party advisory exploit |
https://octopus.com/downloads/compare?from=2018.3.6&to=2018.3.7 | release notes |