CVE-2021-31821

When the Windows Tentacle docker image starts up it logs all the commands that it runs along with the arguments, which writes the Octopus Server API key in plaintext. This does not affect the Linux Docker image
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:octopus:tentacle:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

26 Jan 2022, 03:06

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:octopus:tentacle:*:*:*:*:*:*:*:*
References (MISC) https://advisories.octopus.com/post/2022/sa2022-01/ - (MISC) https://advisories.octopus.com/post/2022/sa2022-01/ - Vendor Advisory
First Time Octopus tentacle
Microsoft
Octopus
Microsoft windows
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 5.5
CWE CWE-312

19 Jan 2022, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-19 06:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-31821

Mitre link : CVE-2021-31821

CVE.ORG link : CVE-2021-31821


JSON object : View

Products Affected

microsoft

  • windows

octopus

  • tentacle
CWE
CWE-312

Cleartext Storage of Sensitive Information