Lucene search

K
attackerkbAttackerKBAKB:272A41FD-6E6B-4BF6-8544-0481382E8B2B
HistoryMar 04, 2024 - 12:00 a.m.

CVE-2024-27198

2024-03-0400:00:00
attackerkb.com
43
jetbrains teamcity
authentication bypass
vulnerability
remote attackers
admin actions

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

EPSS

0.969

Percentile

99.8%

In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

Recent assessments:

sfewer-r7 at March 04, 2024 8:24pm UTC reported:

CVE-2024-27198, allows for a complete compromise of a vulnerable TeamCity server by a remote unauthenticated attacker, including unauthenticated RCE. Compromising a TeamCity server allows an attacker full control over all TeamCity projects, builds, agents and artifacts, and as such is a suitable vector to position an attacker to perform a supply chain attack.

Assessed Attacker Value: 5
Assessed Attacker Value: 5Assessed Attacker Value: 5

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

EPSS

0.969

Percentile

99.8%