103 lines
3.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-2780",
"sourceIdentifier": "security@octopus.com",
"published": "2022-10-14T07:15:08.947",
"lastModified": "2024-11-21T07:01:41.257",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack."
},
{
"lang": "es",
"value": "En las versiones afectadas de Octopus Server es posible usar la funci\u00f3n Git Connectivity test en el proyecto VCS para iniciar una petici\u00f3n SMB, resultando en la posibilidad de un ataque de retransmisi\u00f3n NTLM"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
2023-04-24 12:24:31 +02:00
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-294"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021.2.994",
"versionEndExcluding": "2022.1.3180",
"matchCriteriaId": "EB1227C5-F11E-4FA3-9F88-01B5DC2314E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022.2.6729",
"versionEndExcluding": "2022.2.7965",
"matchCriteriaId": "B85658FF-16A5-4337-8C48-C7CB417CE5E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2022.3.348",
"versionEndExcluding": "2022.3.10586",
"matchCriteriaId": "E5DAAD2C-F71F-4095-9818-E51B8FBBDF1B"
}
]
}
]
}
],
"references": [
{
"url": "https://advisories.octopus.com/post/2022/sa2022-20/",
"source": "security@octopus.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://advisories.octopus.com/post/2022/sa2022-20/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}