You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A vulnerability was reported where an authenticated user with the PackagePush permission could upload a malicious package with a malformed PackageId, causing the Built-In Feed to write the package outside of the Octopus package store.
We should fix this by validationg PackageId's according to the same rules as NuGet Gallery, specifically: ^\w+([_.-]\w+)*$.
The text was updated successfully, but these errors were encountered:
Release Note: Prevent directory traversal security vulnerability in Built-In Feed by validating supplied PackageId’s according to the same rules as NuGet.
This thread has been automatically locked since there has not been any recent activity after it was closed. If you think you've found a related issue, please contact our support team so we can triage your issue, and make sure it's handled appropriately.
lockbot
locked as resolved and limited conversation to collaborators
Nov 24, 2018
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
source: https://secure.helpscout.net/conversation/393753664?folderId=557082
A vulnerability was reported where an authenticated user with the
PackagePush
permission could upload a malicious package with a malformedPackageId
, causing the Built-In Feed to write the package outside of the Octopus package store.We should fix this by validationg
PackageId
's according to the same rules as NuGet Gallery, specifically:^\w+([_.-]\w+)*$
.The text was updated successfully, but these errors were encountered: