Arbitrary Code Execution via Malicious YAML Configuration in Octopus Deploy

Arbitrary Code Execution via Malicious YAML Configuration in Octopus Deploy

CVE-2018-18850 · HIGH Severity

AV:N/AC:L/AU:S/C:C/I:C/A:C

In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM).

Learn more about our Cis Benchmark Audit For Server Software.