{"api_version":"1","generated_at":"2026-04-22T23:09:23+00:00","cve":"CVE-2022-2780","urls":{"html":"https://cve.report/CVE-2022-2780","api":"https://cve.report/api/cve/CVE-2022-2780.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2780","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2780"},"summary":{"title":"CVE-2022-2780","description":"In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack.","state":"PUBLIC","assigner":"security@octopus.com","published_at":"2022-10-14 07:15:00","updated_at":"2022-10-19 14:36:00"},"problem_types":["CWE-294"],"metrics":[],"references":[{"url":"https://advisories.octopus.com/post/2022/sa2022-20/","name":"https://advisories.octopus.com/post/2022/sa2022-20/","refsource":"MISC","tags":[],"title":"Security Advisory 2022-20 |  Octopus Deploy Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2780","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2780","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"2780","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"octopus","cpe5":"octopus_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-2780","ASSIGNER":"security@octopus.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Octopus Deploy","product":{"product_data":[{"product_name":"Octopus Server","version":{"version_data":[{"version_value":"2021.2.994","version_affected":">="},{"version_value":"2022.1.3180","version_affected":"<"},{"version_value":"2022.2.6729","version_affected":">="},{"version_value":"2022.2.7965","version_affected":"<"},{"version_value":"2022.3.348","version_affected":">="},{"version_value":"2022.3.10586","version_affected":"<"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Authentication Bypass by Capture-Replay"}]}]},"references":{"reference_data":[{"url":"https://advisories.octopus.com/post/2022/sa2022-20/","refsource":"MISC","name":"https://advisories.octopus.com/post/2022/sa2022-20/"}]},"description":{"description_data":[{"lang":"eng","value":"In affected versions of Octopus Server it is possible to use the Git Connectivity test function on the VCS project to initiate an SMB request resulting in the potential for an NTLM relay attack."}]}},"nvd":{"publishedDate":"2022-10-14 07:15:00","lastModifiedDate":"2022-10-19 14:36:00","problem_types":["CWE-294"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*","versionStartIncluding":"2022.3.348","versionEndExcluding":"2022.3.10586","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*","versionStartIncluding":"2022.2.6729","versionEndExcluding":"2022.2.7965","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*","versionStartIncluding":"2021.2.994","versionEndExcluding":"2022.1.3180","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}