{"api_version":"1","generated_at":"2026-04-21T15:45:28+00:00","cve":"CVE-2024-27199","urls":{"html":"https://cve.report/CVE-2024-27199","api":"https://cve.report/api/cve/CVE-2024-27199.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-27199","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-27199"},"summary":{"title":"CVE-2024-27199","description":"In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions  was possible","state":"PUBLISHED","assigner":"JetBrains","published_at":"2024-03-04 18:15:09","updated_at":"2026-04-21 12:48:17"},"problem_types":["CWE-23","CWE-22","CWE-23 CWE-23"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.3","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"cve@jetbrains.com","type":"Secondary","score":"7.3","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.3","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"url":"https://www.jetbrains.com/privacy-security/issues-fixed/","name":"https://www.jetbrains.com/privacy-security/issues-fixed/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Fixed security issues","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/Stuub/RCity-CVE-2024-27198/blob/main/RCity.py","name":"https://github.com/Stuub/RCity-CVE-2024-27198/blob/main/RCity.py","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive","name":"https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Press/Media Coverage"],"title":"","mime":"","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-27199","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-27199","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-27199","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27199","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"JetBrains","product":"TeamCity","version":"affected 2023.11.4 semver","platforms":[]}],"timeline":[{"source":"ADP","time":"2026-04-20T00:00:00.000Z","lang":"en","value":"CVE-2024-27199 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"27199","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jetbrains","cpe5":"teamcity","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2024","cve_id":"27199","cve":"CVE-2024-27199","vendorProject":"JetBrains","product":"TeamCity","vulnerabilityName":"JetBrains TeamCity Relative Path Traversal Vulnerability","dateAdded":"2026-04-20","shortDescription":"JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2026-05-04","knownRansomwareCampaignUse":"Unknown","notes":"https://www.jetbrains.com/privacy-security/issues-fixed/ ; https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-27199","cwes":"CWE-23","catalogVersion":"2026.04.21","updated_at":"2026-04-21 13:32:17"},"epss":{"cve_year":"2024","cve_id":"27199","cve":"CVE-2024-27199","epss":"0.824720000","percentile":"0.992320000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:46"},"legacy_qids":[{"cve":"CVE-2024-27199","qid":"150825","title":"JetBrains TeamCity Authentication Bypass Vulnerability (CVE-2024-27199)"},{"cve":"CVE-2024-27199","qid":"379449","title":"JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (TW-86500, TW-86502)"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-02T00:27:59.868Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://www.jetbrains.com/privacy-security/issues-fixed/"},{"tags":["x_transferred"],"url":"https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive"}],"title":"CVE Program Container"},{"metrics":[{"other":{"content":{"id":"CVE-2024-27199","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2024-03-04T00:00:00+00:00","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2026-04-20","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-27199"},"type":"kev"}}],"providerMetadata":{"dateUpdated":"2026-04-21T03:55:31.232Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/Stuub/RCity-CVE-2024-27198/blob/main/RCity.py"},{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-27199"}],"timeline":[{"lang":"en","time":"2026-04-20T00:00:00.000Z","value":"CVE-2024-27199 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"TeamCity","vendor":"JetBrains","versions":[{"lessThan":"2023.11.4","status":"affected","version":"0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions  was possible"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-23","description":"CWE-23","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2024-03-11T14:15:27.549Z","orgId":"547ada31-17d8-4964-bc5f-1b8238ba8014","shortName":"JetBrains"},"references":[{"url":"https://www.jetbrains.com/privacy-security/issues-fixed/"},{"url":"https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive"}]}},"cveMetadata":{"assignerOrgId":"547ada31-17d8-4964-bc5f-1b8238ba8014","assignerShortName":"JetBrains","cveId":"CVE-2024-27199","datePublished":"2024-03-04T17:21:40.081Z","dateReserved":"2024-02-21T09:53:25.423Z","dateUpdated":"2026-04-21T03:55:31.232Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-03-04 18:15:09","lastModifiedDate":"2026-04-21 12:48:17","problem_types":["CWE-23","CWE-22","CWE-23 CWE-23"],"metrics":{"cvssMetricV31":[{"source":"cve@jetbrains.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*","versionEndExcluding":"2023.11.4","matchCriteriaId":"66B25AF5-F103-4A5C-8A39-901357131404"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"27199","Ordinal":"1","Title":"CVE-2024-27199","CVE":"CVE-2024-27199","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"27199","Ordinal":"1","NoteData":"In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions  was possible","Type":"Description","Title":"CVE-2024-27199"}]}}}