Authentication Bypass in TeamCity Could Lead to Remote Code Execution

CVE-2024-23917
9.8CRITICAL

Key Information

Vendor
Jetbrains
Status
Teamcity
Vendor
CVE Published:
6 February 2024

Badges

😄 Trended👾 Exploit Exists📰 News Worthy

Summary

The CVE-2024-23917 vulnerability in JetBrains TeamCity On-Premises allows an unauthenticated attacker with HTTP(S) access to bypass authentication and gain remote code execution. The vulnerability affects all versions of TeamCity On-Premises from 2017.1 through 2023.11.2. The potential impact of successful exploitation includes unauthorized access, remote code execution, data breaches, system compromise, reputation damage, and financial loss. JetBrains has released a patch for the vulnerability, and affected users are urged to upgrade to a secure version to mitigate the risk of exploitation. There is currently no information on any exploitation by ransomware groups.

Affected Version(s)

TeamCity < 2023.11.3

News Articles

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • Vulnerability started trending.

  • First article discovered by The JetBrains Blog

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database14 News Article(s)
.