In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM).
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2018-10-31T03:00:00

Updated: 2024-08-05T11:23:08.263Z

Reserved: 2018-10-30T00:00:00

Link: CVE-2018-18850

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2018-10-31T03:29:00.207

Modified: 2022-07-27T16:40:50.867

Link: CVE-2018-18850

cve-icon Redhat

No data.