CVE-2024-27198 - Authentication Bypass Using an Alternate Path vulnerability in JetBrains TeamCity Server
- Please refer to Rapid7's blogpost for more information: CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities
Products and Versions affected:
Product | Affected Versions |
---|---|
TeamCity Server | <= 2023.11.3 |
You can deploy a TeamCity server with Docker to test this exploit
- Download a vulnerable TeamCity Server docker image, for this case version: 2023.11.3
docker pull jetbrains/teamcity-server:2023.11.3
- Then run the docker container
docker run -it -d --name teamcity -u root -p 8111:8111 jetbrains/teamcity-server:2023.11.3
- Finally, go to:
http://localhost:8111
and follow the configuration instructions for your new server (just clickProceed
and create a new admin account).
usage: CVE-2024-27198.py [-h] -t TARGET -u USERNAME -p PASSWORD
options:
-h, --help show this help message and exit
-t TARGET, --target TARGET
Target TeamCity Server URL
-u USERNAME, --username USERNAME
Insert username for the new user
-p PASSWORD, --password PASSWORD
Insert password for the new user
Example:
python CVE-2024-27198.py -t http://localhost:8111 -u mynewadminuser -p mypassword
- CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)
- Additional Critical Security Issues Affecting TeamCity On-Premises (CVE-2024-27198 and CVE-2024-27199) – Update to 2023.11.4 Now
- CISA Adds One Known Exploited JetBrains Vulnerability, CVE-2024-27198, to Catalog
- GreyNoise Tag - TeamCity JetBrain CVE-2024-27198 Auth Bypass Attempt