CVE-2018-18850
HIGHOctopus Deploy <2018.9.1 - RCE
Title source: llmDescription
In Octopus Deploy 2018.8.0 through 2018.9.x before 2018.9.1, an authenticated user with permission to modify deployment processes could upload a maliciously crafted YAML configuration, potentially allowing for remote execution of arbitrary code, running in the same context as the Octopus Server (for self-hosted installations by default, SYSTEM).
Exploits (1)
metasploit
WORKING POC
EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/octopusdeploy_deploy.rb
Scores
CVSS v3
8.8
EPSS
0.5343
EPSS Percentile
98.0%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
Status
published
Products (1)
octopus/octopus_server
2018.8.0 - 2018.8.12
Published
Oct 31, 2018
Tracked Since
Feb 18, 2026