CVE-2024-4456

In affected versions of Octopus Server with certain access levels it was possible to embed a Cross-Site Scripting payload on the audit page.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*
cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

30 Jun 2025, 18:04

Type Values Removed Values Added
First Time Octopus
Linux
Microsoft windows
Octopus octopus Server
Microsoft
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References () https://advisories.octopus.com/post/2024/sa2024-04/ - () https://advisories.octopus.com/post/2024/sa2024-04/ - Vendor Advisory
CPE cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

08 May 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-08 01:15

Updated : 2025-06-30 18:04


NVD link : CVE-2024-4456

Mitre link : CVE-2024-4456


JSON object : View

Products Affected

linux

  • linux_kernel

microsoft

  • windows

octopus

  • octopus_server
CWE

No CWE.