
Cloud Vulnerability DB
A community-led vulnerabilities database
In Octopus Server versions after 2018.8.2, a security vulnerability was identified where if the Octopus Server Web Request Proxy is configured with authentication, the password is shown in plaintext in the UI (NVD).
The vulnerability is tracked as CVE-2021-31820 and has been assigned a CVSS v3.1 base score of 7.5 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The issue is classified under CWE-312 (Cleartext Storage of Sensitive Information) and affects Octopus Server versions from 2018.8.2 up to but not including 2020.6.5310, and versions from 2021.1.0 up to but not including 2021.1.7622 (NVD).
The vulnerability exposes proxy authentication passwords in plaintext through the user interface, potentially allowing unauthorized users to view sensitive credentials. This could lead to unauthorized access to proxy-protected resources and compromise of proxy authentication mechanisms (NVD).
The issue has been addressed in subsequent versions of Octopus Server. Users should upgrade to version 2020.6.5310 or later if running in the 2020.6.x series, or to version 2021.1.7622 or later if running in the 2021.1.x series (NVD, Octopus Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."