CVE-2021-31821 Vulnerability Details

  /     /     /  

CVE-2021-31821 Metadata Quick Info

CVE Published: 19/01/2022 | CVE Updated: 03/08/2024 | CVE Year: 2021
Source: Octopus | Vendor: Octopus Deploy | Product: Octopus Tentacle
Status : PUBLISHED

CVE-2021-31821 Description

When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: Cleartext Storage of Sensitive Information in Octopus Tentacle Windows Docker image
Source: Octopus Deploy

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).