QID 150825

Date Published: 2024-03-11

QID 150825: JetBrains TeamCity Authentication Bypass Vulnerability (CVE-2024-27199)

TeamCity is a general-purpose CI/CD software platform that allows for flexible workflows, collaboration and development practices.

JetBrains TeamCity is affected by a Path traversal vulnerability which allows to perform admin actions.

Affected Versions:
JetBrains TeamCity prior to 2023.11.4

QID Detection Logic (Unauthenticated):
This QID sends HTTP GET request to 'res/../admin/diagnostic.jsp', '.well-known/acme-challenge/../../admin/diagnostic.jsp' and 'update/../admin/diagnostic.jsp' endpoints and based on the response determines if the host is vulnerable.

Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to gain access to sensitive admin endpoints exposing information about TeamCity server.

  • CVSS V3 rated as High - 7.3 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to upgrade TeamCity to version 2023.11.4 or later to remediate this vulnerability. For more information please refer JetBrains TeamCity

    CVEs related to QID 150825

    Software Advisories
    Advisory ID Software Component Link
    JetBrains TeamCity URL Logo blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/