CVE-2022-2780 Vulnerability Details

  /     /     /  

CVE-2022-2780 Metadata Quick Info

CVE Published: 14/10/2022 | CVE Updated: 03/08/2024 | CVE Year: 2022
Source: Octopus | Vendor: Octopus Deploy | Product: Octopus Server
Status : PUBLISHED

CVE-2022-2780 Description

In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: Authentication Bypass by Capture-Replay
Source: Octopus Deploy

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).