Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TEAM_CITY_CVE-2024-27198.NBIN
HistoryMar 05, 2024 - 12:00 a.m.

JetBrains TeamCity Authentication Bypass (CVE-2024-27198)

2024-03-0500:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
21
jetbrains
teamcity
authentication bypass
cve-2024-27198
scanner
binary data

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

Low

EPSS

0.969

Percentile

99.8%

An authentication bypass vulnerability exists in JetBrains TeamCity versions prior to 2023.11.4. An unauthenticated, remote attacker can exploit this, via a specially crafted HTTP GET request, to bypass authentication and perform admin actions remotely.

Binary data team_city_cve-2024-27198.nbin

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

Low

EPSS

0.969

Percentile

99.8%