CVE-2022-2780

EUVD-2022-35021
In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 60%
Affected Products (NVD)
VendorProductVersion
octopusoctopus_server
2021.2.994 ≤
𝑥
< 2022.1.3180
octopusoctopus_server
2022.2.6729 ≤
𝑥
< 2022.2.7965
octopusoctopus_server
2022.3.348 ≤
𝑥
< 2022.3.10586
𝑥
= Vulnerable software versions