In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.jetbrains.com/privacy-security/issues-fixed/ | vendor advisory |
https://blog.jetbrains.com/teamcity/2023/09/cve-2023-42793-vulnerability-post-mortem/ | vendor advisory |
http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html | third party advisory exploit vdb entry |
https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793 | third party advisory |
https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/ | press/media coverage |
https://www.rapid7.com/blog/post/2023/09/25/etr-cve-2023-42793-critical-authentication-bypass-in-jetbrains-teamcity-ci-cd-servers/ | third party advisory |
https://www.sonarsource.com/blog/teamcity-vulnerability/ | exploit third party advisory |