NA

CVE-2024-23917

Published: 06/02/2024 Updated: 09/02/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In JetBrains TeamCity prior to 2023.11.3 authentication bypass leading to RCE was possible

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jetbrains teamcity

Vendor Advisories

Check Point Reference: CPAI-2024-0226 Date Published: 6 May 2024 Severity: Critical ...

Recent Articles

JetBrains urges swift patching of latest critical TeamCity flaw
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Cloud version is safe, but no assurances offered about possible on-prem exploits

JetBrains is encouraging all users of TeamCity (on-prem) to upgrade to the latest version following the disclosure of a critical vulnerability in the CI/CD tool. Tracked as CVE-2024-23917, the vulnerability has been assigned a provisional 9.8 CVSS score and allows unauthenticated remote attackers to take over vulnerable servers with admin privileges. "All versions from 2017.1 through 2023.11.2 are affected by this issue," Daniel Gallo, solutions engineer at JetBrains, said in an advisory. "The i...