Description
In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42975 | In affected versions of Octopus Deploy users of certain browsers using AD to sign-in to Octopus Server were able to bypass authentication checks and be redirected to the configured redirect url without any validation. |
References
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2022/sa2022-26/ |
|
History
Thu, 10 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-288 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-04-10T14:45:59.345Z
Reserved: 2022-10-19T00:00:00.000Z
Link: CVE-2022-3614
Updated: 2024-08-03T01:14:02.447Z
Status : Modified
Published: 2023-01-03T02:15:16.620
Modified: 2025-04-10T15:15:50.037
Link: CVE-2022-3614
No data.
OpenCVE Enrichment
No data.
EUVD