CVE-2021-21270

OctopusDSC is a PowerShell module with DSC resources that can be used to install and configure an Octopus Deploy Server and Tentacle agent. In OctopusDSC version 4.0.977 and earlier a customer API key used to connect to Octopus Server is exposed via logging in plaintext. This vulnerability is patched in version 4.0.1002.
Configurations

Configuration 1 (hide)

cpe:2.3:a:octopus:octopusdsc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:47

Type Values Removed Values Added
CVSS v2 : 2.1
v3 : 5.5
v2 : 2.1
v3 : 6.2
References () https://github.com/OctopusDeploy/OctopusDSC/commit/24b448e6ac964ed938475add494a145c0473ac42 - Patch, Third Party Advisory () https://github.com/OctopusDeploy/OctopusDSC/commit/24b448e6ac964ed938475add494a145c0473ac42 - Patch, Third Party Advisory
References () https://github.com/OctopusDeploy/OctopusDSC/pull/270 - Patch, Third Party Advisory () https://github.com/OctopusDeploy/OctopusDSC/pull/270 - Patch, Third Party Advisory
References () https://github.com/OctopusDeploy/OctopusDSC/releases/tag/v4.0.1002 - Release Notes, Third Party Advisory () https://github.com/OctopusDeploy/OctopusDSC/releases/tag/v4.0.1002 - Release Notes, Third Party Advisory
References () https://github.com/OctopusDeploy/OctopusDSC/security/advisories/GHSA-phmm-rfg9-94fm - Third Party Advisory () https://github.com/OctopusDeploy/OctopusDSC/security/advisories/GHSA-phmm-rfg9-94fm - Third Party Advisory

Information

Published : 2021-01-22 18:15

Updated : 2024-11-21 05:47


NVD link : CVE-2021-21270

Mitre link : CVE-2021-21270

CVE.ORG link : CVE-2021-21270


JSON object : View

Products Affected

octopus

  • octopusdsc
CWE
CWE-319

Cleartext Transmission of Sensitive Information