CVE-2024-27198

critical

Description

In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible

References

https://securelist.com/vulnerability-report-q1-2024/112554/

https://www.hivepro.com/threat-advisory/teamcity-vulnerabilities-unleash-jasmin-ransomware-and-more/

https://www.scmagazine.com/news/open-source-ransomware-rats-deployed-on-compromised-teamcity-servers

https://securityaffairs.com/160823/breaking-news/jetbrains-teamcity-flaws-actively-exploited.html

https://www.rapid7.com/blog/post/2024/03/15/metasploit-wrap-up-03-15-24/

https://therecord.media/jetbrains-rapid7-silent-patching-dispute?&web_view=true

https://www.hivepro.com/threat-digest/attacks-vulnerabilities-and-actors-4-to-10-march-2024/

https://securityaffairs.com/160357/hacking/bianlian-group-ttack-jetbrains-teamcity.html?web_view=true

https://securityaffairs.com/160357/hacking/bianlian-group-ttack-jetbrains-teamcity.html

https://thehackernews.com/2024/03/bianlian-threat-actors-exploiting.html

https://thecyberthrone.in/2024/03/10/thecyberthrone-security-week-in-review-march-9-2024/

https://securityaffairs.com/160236/security/jetbrains-teamcity-bug-cisa-known-exploited-vulnerabilities-catalog.html

https://www.guidepointsecurity.com/blog/bianlian-gos-for-powershell-after-teamcity-exploitation/

https://www.bleepingcomputer.com/news/security/critical-teamcity-flaw-now-widely-exploited-to-create-admin-accounts/?&web_view=true

https://www.bleepingcomputer.com/news/security/critical-teamcity-flaw-now-widely-exploited-to-create-admin-accounts/

https://www.theregister.com/2024/03/07/teamcity_exploits_lead_to_ransomware/

https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive

https://www.hivepro.com/threat-advisory/critical-vulnerabilities-discovered-in-teamcity-enable-server-takeover/

https://www.tenable.com/blog/cve-2024-27198-cve-2024-27199-two-authentication-bypass-vulnerabilities-in-jetbrains-teamcity

https://www.bleepingcomputer.com/news/security/teamcity-auth-bypass-bug-exploited-to-mass-generate-admin-accounts/

https://thecyberthrone.in/2024/03/05/critical-teamcity-vulnerabilities-patched-cve-2024-27198-cve-2024-27199/

https://www.theregister.com/2024/03/05/rapid7_jetbrains_vuln_disclosure_dispute/

https://securityaffairs.com/159995/security/jetbrains-teamcity-flaws.html

https://www.bleepingcomputer.com/news/security/exploit-available-for-new-critical-teamcity-auth-bypass-bug-patch-now/?&web_view=true

https://www.bleepingcomputer.com/news/security/exploit-available-for-new-critical-teamcity-auth-bypass-bug-patch-now/

https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/

https://www.jetbrains.com/privacy-security/issues-fixed/

https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive

Details

Source: Mitre, NVD

Published: 2024-03-04

Updated: 2024-03-11

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical