
Cloud Vulnerability DB
A community-led vulnerabilities database
A Regex Denial of Service (ReDoS) vulnerability was discovered in Octopus Server's build information request validation (CVE-2022-2075). The vulnerability was discovered on June 6, 2022, and patched on June 21, 2022. This vulnerability affected all versions of Octopus Server from 0.x.x through 2022.3.x before version 2022.3.4953 (Octopus Advisory).
When exploited, this vulnerability could cause Octopus Server to become unresponsive due to excessive CPU usage through a Regex Denial of Service attack targeting the build information request validation. The vulnerability has been assigned a CVSS score of 6.5 (Medium severity) (Octopus Advisory).
Successful exploitation of this vulnerability results in Octopus Server becoming unresponsive due to excessive CPU usage, effectively creating a denial of service condition (Octopus Advisory).
There are no known mitigations for this vulnerability other than upgrading to a fixed version. The issue was patched in Octopus Server versions 2022.1.2894, 2022.2.6872, and 2022.3.4953. Users are strongly recommended to upgrade to these or later versions as soon as possible (Octopus Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."