Skip to main content

Improper Privilege Management


Severity High
Score 7.5/10


In Octopus Deploy before 2018.4.7, target and tenant tag variable scopes were not checked against the list of tenants the user has access to.

  • LOW
  • NONE
  • NONE
  • NONE
  • HIGH
  • NONE

CWE-269 - Improper Privilege Management

An effective privilege management infrastructure provides valid users with required access and privileges across heterogeneous technology environments. An application with a faulty privilege management infrastructure allows higher than authorized privileges or enables privilege escalation. This can lead to security incidents such as system infiltration, data breach, and complete system takeover.


Advisory Timeline

  • Published