Authentication Bypass in TeamCity Could Lead to Remote Code Execution
Key Information
- Vendor
- Jetbrains
- Status
- Teamcity
- Vendor
- CVE Published:
- 6 February 2024
Badges
Summary
The CVE-2024-23917 vulnerability in JetBrains TeamCity On-Premises allows an unauthenticated attacker with HTTP(S) access to bypass authentication and gain remote code execution. The vulnerability affects all versions of TeamCity On-Premises from 2017.1 through 2023.11.2. The potential impact of successful exploitation includes unauthorized access, remote code execution, data breaches, system compromise, reputation damage, and financial loss. JetBrains has released a patch for the vulnerability, and affected users are urged to upgrade to a secure version to mitigate the risk of exploitation. There is currently no information on any exploitation by ransomware groups.
Affected Version(s)
TeamCity < 2023.11.3
News Articles
Article: CVE-2024-23917 TeamCity On-Premises Vulnerability - WNEsecurity
CVE-2024-23917 TeamCity On-Premises Vulnerability may enable an unauthenticated attacker with HTTP(S) access to a TeamCity server to bypass authentication...
8 months ago
CVE-2024-23917: Critical Vulnerability Affecting On-Premises Servers Of TeamCity – CyberIQs
On 5 February 2023, JetBrains published a blog describing a critical vulnerability (CVE-2024-23917) affecting the On-Premises Servers of TeamCity. An
8 months ago
CVE-2024-23917 | Arctic Wolf
On February 5, 2023, JetBrains published a blog describing a critical vulnerability (CVE-2024-23917) affecting the On-Premises Servers of TeamCity. Find Arctic Wolf's recommendations.
8 months ago
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 👾
Exploit exists.
Vulnerability started trending.
First article discovered by The JetBrains Blog
Vulnerability published.
Vulnerability Reserved.