Updated CVE for SA2022-01

This commit is contained in:
OctoJames 2022-01-19 15:18:57 +10:00
parent 01341f5320
commit a1a67d1755

View File

@ -4,15 +4,60 @@
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-31821",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "security@octopus.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Octopus Deploy",
"product": {
"product_data": [
{
"product_name": "Octopus Tentacle",
"version": {
"version_data": [
{
"version_value": "<",
"version_affected": "6.1.1266"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cleartext Storage of Sensitive Information in Octopus Tentacle Windows Docker image"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://advisories.octopus.com/post/2022/sa2022-01/",
"refsource": "MISC",
"name": "https://advisories.octopus.com/post/2022/sa2022-01/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
"description_data": [
{
"lang": "eng",
"value": "When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image"
}
]
}
}