CVE-2021-26556

When Octopus Server is installed using a custom folder location, folder ACLs are not set correctly and could lead to an unprivileged user using DLL side-loading to gain privileged access.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*
cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:31

Type Values Removed Values Added
References
  • {'url': 'https://advisories.octopus.com/adv/2021-01---Local-privilege-escalation-in-Octopus-Server-(CVE-2021-26556).1733296189.html', 'name': 'https://advisories.octopus.com/adv/2021-01---Local-privilege-escalation-in-Octopus-Server-(CVE-2021-26556).1733296189.html', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • () https://advisories.octopus.com/adv/2021-01---Local-privilege-escalation-in-Octopus-Server-%28CVE-2021-26556%29.1733296189.html -

Information

Published : 2021-10-07 01:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-26556

Mitre link : CVE-2021-26556

CVE.ORG link : CVE-2021-26556


JSON object : View

Products Affected

octopus

  • octopus_server
  • octopus_deploy
CWE
CWE-426

Untrusted Search Path