Octopus Deploy is an automated deployment and release management server. It is designed to simplify deployment of ASP.NET applications, Windows Services, and databases. Crafted requests to the deployment’s API endpoint can be used to force the deployment server to execute arbitrary scripts via a weaponized template. Valid credentials are required to perform the attack.
- The authenticated attacker makes a PUT request to the deployment’s API containing a weaponized call to detonate arbitrary script against the deployment server.
- The deployment server deploys the weaponized script resulting in payload execution.
The public-facing host running Octopus Deploy Server is configured with an available project.
Alert Logic Coverage
Alert Logic® has evaluated its customer base for exposure to the exploit and has developed signatures for mitigating the threat depending on the security service in place.
The Network-Based Intrusion Detection System (IDS) has been updated with the new signatures for this exploit when detected via Alert Logic Threat Manager™. If this signature is detected, an incident is generated in the Alert Logic console.
Recommendations for Mitigation
Strict enforcement of access and credentials policies will greatly help to mitigate this attack as the vulnerability in question abuses legitimate functionality using stolen or compromised credentials.
Servers that must be exposed to remote connections should adhere to the hardening guidelines available in the application documentation (https://octopus.com/docs/administration/security/hardening-octopus). If public access is not explicitly required, it should be removed to increase security. Due to the authenticated nature of the vulnerability, due diligence should be taken to secure the accounts and API keys associated with any suspected compromise.
Please sign in to leave a comment.