In February 2024, Rapid7 discovered two critical authentication bypass vulnerabilities in JetBrains TeamCity, tracked as CVE-2024-27198 (CVSS 9.8) and CVE-2024-27199 (CVSS 7.3). These flaws could allow unauthenticated attackers to gain administrative control over the TeamCity server, potentially leading to complete server compromise and supply chain attacks. Rapid7 disclosed these findings to JetBrains, but the vendor released a fix without coordinating with Rapid7. In this blog post, we will explore the details of these Authentication Bypass Vulnerabilities in TeamCity, their impact, and the affected versions. We will also provide a step-by-step guide on protecting your TeamCity server by upgrading to the patched version (2023.11.4) or applying the security patch plugin.
TeamCity is a popular CI/CD server developed by JetBrains. It helps development teams to automate their building, testing, and deployment processes. TeamCity supports various programming languages, frameworks, and platforms, making it a versatile tool for continuous integration and delivery. With its user-friendly interface and extensive plugin ecosystem, TeamCity has become a go-to solution for many organizations looking to streamline their software development lifecycle.
CVE ID: CVE-2024-27198
Description: Authentication bypass vulnerability in the web component of TeamCity that arises from an alternative path issue (CWE-288)
CVSS Score: 9.8 (Critical)
CVE Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-27198, the more severe of the two Authentication Bypass Vulnerabilities in TeamCity, is caused by an alternative path issue in the jetbrains.buildServer.controllers.BaseController
class, implemented in the web-openapi.jar
library. By crafting a specific URL, an attacker can bypass all authentication checks, granting unauthenticated access to endpoints intended for authenticated users only. This critical flaw enables attackers to take complete control of a vulnerable TeamCity server, including creating new administrator accounts or generating administrator access tokens, potentially leading to a full system compromise and unauthorized access to all projects, builds, agents, and artifacts associated with the server.
CVE ID: CVE-2024-27199
Description: Authentication bypass vulnerability in the web component of TeamCity that arises from a path traversal issue (CWE-22)
CVSS Score: 7.3 (High)
CVE Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CVE-2024-27199, one of the critical Authentication Bypass Vulnerabilities in TeamCity, stems from a path traversal issue in several paths of the TeamCity web server, including /res/
, /update/
, and /.well-known/acme-challenge/
. Exploiting this flaw, an unauthenticated attacker can leverage double dot path segments to traverse to an alternative endpoint, effectively bypassing authentication checks. This vulnerability allows attackers to modify a limited number of system settings on the server and disclose sensitive information, such as replacing the HTTPS certificate with a certificate of the attacker's choosing, potentially enabling man-in-the-middle attacks or causing denial-of-service conditions.
According to JetBrains, all TeamCity versions prior to 2023.11.4 are affected by the critical Authentication Bypass Vulnerabilities identified as CVE-2024-27198 and CVE-2024-27199. However, TeamCity Cloud servers have already been patched, and JetBrains has verified that these managed instances were not compromised.
To address the critical Authentication Bypass Vulnerabilities in TeamCity, tracked as CVE-2024-27198 and CVE-2024-27199, JetBrains released TeamCity version 2023.11.4 on March 3, 2024. This updated version includes patches for both vulnerabilities, effectively mitigating the risks associated with these flaws.
For users who are unable to upgrade to TeamCity 2023.11.4, JetBrains has provided an alternative mitigation option in the form of a security patch plugin. This plugin can be installed on all TeamCity versions up to and including 2023.11.3, offering protection against the Authentication Bypass Vulnerabilities.
To upgrade your TeamCity server to the fixed release (2023.11.4) and safeguard your system from CVE-2024-27198 and CVE-2024-27199, follow these step-by-step instructions:
Download the latest version of TeamCity (2023.11.4) from the official JetBrains website.
Stop your current TeamCity server.
Create a backup of your TeamCity Data Directory and any customized configuration files, such as conf\server.xml
and conf\web.xml
.
Remove all the files from your previous TeamCity installation in the TeamCity Server Home directory.
Place the new TeamCity files (version 2023.11.4) into the same location where you removed the old files.
Restore the TeamCity Data Directory and any customized configuration files that you backed up in step 3.
Start your updated TeamCity server.
If you prefer to use the automatic update option within TeamCity, simply follow the on-screen instructions provided by the TeamCity user interface to complete the upgrade process.
By upgrading to TeamCity 2023.11.4 or applying the security patch plugin, you can protect your TeamCity server from the critical Authentication Bypass Vulnerabilities and ensure the security and integrity of your CI/CD pipeline.
The discovery of CVE-2024-27198 and CVE-2024-27199 highlights the importance of staying vigilant and promptly addressing security vulnerabilities in CI/CD systems like TeamCity. These Authentication Bypass Vulnerabilities in TeamCity could lead to severe consequences, such as complete server compromise and potential supply chain attacks. It is crucial for TeamCity users to upgrade their servers to the latest version (2023.11.4) or apply the security patch plugin provided by JetBrains as soon as possible. Additionally, organizations should regularly monitor for security updates and adhere to best practices in securing their CI/CD pipelines to minimize the risk of potential attacks. By taking proactive measures and prioritizing security, development teams can ensure the integrity and reliability of their software development lifecycle while leveraging the powerful features of TeamCity.
We hope this post helps you know how to protect your TeamCity from CVE-2024-27198 and CVE-2024-27199- Authentication Bypass Vulnerabilities. Thanks for reading this post. Please share this post and help secure the digital world.Visit our website thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive updates like this.
You may also like these articles:
How to Fix CVE-2023-42793- A Critical Authentication Bypass Vulnerability in TeamCity?
What is Authentication Bypass Vulnerability? How To Prevent It?
How To Fix CVE-2022-20695- A Critical Authentication Bypass Vulnerability In Cisco WLC
How To Fix CVE-2022-0540- A Critical Authentication Bypass Vulnerability In Jira Seraph
How to Fix CVE-2023-20238- An Authentication Bypass Vulnerability in Cisco BroadWorks?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.