Critical Vulnerability in JetBrains’ TeamCity Exposes Servers to Remote Takeover

by | Mar 5, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A critical security vulnerability (CVE-2024-27198) discovered in JetBrains’ TeamCity On-Premises CI/CD solution has raised alarms, as it permits remote unauthenticated attackers to gain administrative control over servers.

The vulnerability, disclosed by security researcher Stephen Fewer from Rapid7, exposes a severe loophole in the web component of TeamCity, allowing unauthorized access without authentication. With full technical details available for exploitation, administrators are strongly urged to prioritize updating to the latest version or applying the provided security patch plugin promptly.

In response, JetBrains swiftly released a new version of the product, also addressing a secondary security concern (CVE-2024-27199), albeit less severe, which enables unauthorized modification of certain system settings without authentication. Both vulnerabilities, affecting all versions of on-premise installations, underscore the critical need for immediate action.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

The Vulnerabilities Unveiled

CVE-2024-27198 (Critical, 9.8 severity): This authentication bypass flaw empowers attackers to take complete control of vulnerable TeamCity On-Premises servers, potentially leading to remote code execution. Rapid7 demonstrated the gravity of the issue by crafting an exploit that facilitated unauthorized access and even shell access (Meterpreter session) on the targeted servers.

CVE-2024-27198 exploited to get shell on TeamCity serverCVE-2024-27198 exploited for backdoor access on TeamCity server
source: Rapid7

CVE-2024-27199 (High, 7.3 severity): This vulnerability, although less severe, permits path traversal within the TeamCity web component, circumventing authentication measures. While requiring prior access to the victim network, it remains significant, with potential exploitation for denial-of-service (DoS) attacks or eavesdropping on client connections.

Rapid7 highlights that attackers could trigger a Denial of Service (DoS) situation on the server by manipulating the HTTPS port number or by uploading a certificate that clients neglect to validate.

Exploiting CVE-2024-27199 to upload malicious certificate and change port numberExploiting CVE-2024-27199 to modify the HTTPS certificate and port number
source: Rapid7




Addressing the Issue

JetBrains responded by releasing TeamCity 2023.11.4, containing fixes for both vulnerabilities. Administrators are strongly advised to update their servers immediately. For those unable to update immediately, JetBrains offers a security patch plugin for older versions.

It’s noteworthy that the cloud variant of TeamCity has already been patched, and there are no reported attempts by threat actors to exploit these vulnerabilities on cloud servers. However, on-premise installations remain vulnerable, especially given the availability of detailed exploitation instructions.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This