CVE-2018-18850

HIGH

Octopus Deploy <2018.9.1 - RCE

Title source: llm

Description

In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM).

Exploits (1)

metasploit WORKING POC EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/octopusdeploy_deploy.rb

Scores

CVSS v3 8.8
EPSS 0.5343
EPSS Percentile 98.0%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

Status published
Products (1)
octopus/octopus_server 2018.8.0 - 2018.8.12
Published Oct 31, 2018
Tracked Since Feb 18, 2026