Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

An issue was discovered in Octopus Deploy 3.4. A deployment target can be configured with an Account or Certificate that is outside the scope of the deployment target. An authorised user can potentially use a certificate that they are not in scope to use. An authorised user is also able to obtain certificate metadata by associating a certificate with certain resources that should fail scope validation.

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.