In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.jetbrains.com/privacy-security/issues-fixed/ | vendor advisory |
https://blog.jetbrains.com/teamcity/2023/09/cve-2023-42793-vulnerability-post-mortem/ | vendor advisory |
http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html | third party advisory vdb entry exploit |
https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793 | third party advisory |
https://www.securityweek.com/recently-patched-teamcity-vulnerability-exploited-to-hack-servers/ | press/media coverage |
https://www.rapid7.com/blog/post/2023/09/25/etr-cve-2023-42793-critical-authentication-bypass-in-jetbrains-teamcity-ci-cd-servers/ | third party advisory |
https://www.sonarsource.com/blog/teamcity-vulnerability/ | third party advisory exploit |