Skip to content

yoryio/CVE-2024-27198

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

CVE-2024-27198

CVE-2024-27198 - Authentication Bypass Using an Alternate Path vulnerability in JetBrains TeamCity Server

teamcityserverlogo

Products and Versions affected:

Product Affected Versions
TeamCity Server <= 2023.11.3
  • CVSS: 9.8
  • Actively Exploited: YES
  • Patch: YES
  • Mitigation: YES

Lab

You can deploy a TeamCity server with Docker to test this exploit

  • Download a vulnerable TeamCity Server docker image, for this case version: 2023.11.3
docker pull jetbrains/teamcity-server:2023.11.3
  • Then run the docker container
docker run -it -d --name teamcity -u root -p 8111:8111 jetbrains/teamcity-server:2023.11.3
  • Finally, go to: http://localhost:8111 and follow the configuration instructions for your new server (just click Proceed and create a new admin account).

Help

usage: CVE-2024-27198.py [-h] -t TARGET -u USERNAME -p PASSWORD

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Target TeamCity Server URL
  -u USERNAME, --username USERNAME
                        Insert username for the new user
  -p PASSWORD, --password PASSWORD
                        Insert password for the new user

Example:

python CVE-2024-27198.py -t http://localhost:8111 -u mynewadminuser -p mypassword

References

About

Exploit for CVE-2024-27198 - TeamCity Server

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages