Vulnerabilites related to Octopus Deploy - Kubernetes Worker or Kubernetes Agent
CVE-2024-12226 (GCVE-0-2024-12226)
Vulnerability from cvelistv5
Published
2025-01-16 06:48
Modified
2025-01-16 14:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Summary
In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Octopus Deploy | Kubernetes Worker or Kubernetes Agent |
Version: 1.x < 1.19.0 Version: 2.x < 2.8.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-12226", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-16T14:21:00.502702Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-16T14:21:30.387Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Kubernetes Worker or Kubernetes Agent", "vendor": "Octopus Deploy", "versions": [ { "lessThan": "1.19.0", "status": "affected", "version": "1.x", "versionType": "custom" }, { "lessThan": "2.8.0", "status": "affected", "version": "2.x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly." } ], "value": "In affected versions of the Octopus Kubernetes worker or agent, sensitive variables could be written to the Kubernetes script pod log in clear-text. This was identified in Version 2 however it was determined that this could also be achieved in Version 1 and the fix was applied to both versions accordingly." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-16T06:48:20.279Z", "orgId": "6f4f8c89-ef06-4bae-a2a5-6734ddf76272", "shortName": "Octopus" }, "references": [ { "url": "https://advisories.octopus.com/post/2024/sa2024-10/" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "6f4f8c89-ef06-4bae-a2a5-6734ddf76272", "assignerShortName": "Octopus", "cveId": "CVE-2024-12226", "datePublished": "2025-01-16T06:48:20.279Z", "dateReserved": "2024-12-05T03:36:29.513Z", "dateUpdated": "2025-01-16T14:21:30.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }