{"id":24115,"date":"2024-03-08T05:10:06","date_gmt":"2024-03-08T13:10:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/03\/08\/news-17845\/"},"modified":"2024-03-08T05:10:06","modified_gmt":"2024-03-08T13:10:06","slug":"news-17845","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/03\/08\/news-17845\/","title":{"rendered":"Update now! JetBrains TeamCity vulnerability abused at scale"},"content":{"rendered":"\n<p>JetBrains issued a <a href=\"https:\/\/blog.jetbrains.com\/teamcity\/2024\/03\/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">warning<\/a> on March 4, 2024 about two serious vulnerabilities in TeamCity server. The flaws can be used by a remote, unauthenticated attacker with HTTP(S) access to a TeamCity on-premises server to bypass authentication checks and gain administrative control of the TeamCity server.<\/p>\n<p>TeamCity is a build management and continuous integration and deployment server from JetBrains that allows developers to commit code changes into a shared repository several times a day. Each commit is followed by an automated build to ensure that the new changes integrate well into the existing code base and as such can be used to detect problems early.<\/p>\n<p>Compromising a TeamCity server allows an attacker full control over all TeamCity projects, builds, agents and artifacts. Which, depending on the use-case of your projects, could make for a suitable attack vector leading to a <a href=\"https:\/\/www.malwarebytes.com\/glossary\/supply-chain-attack\">supply chain attack<\/a>.<\/p>\n<p>The two vulnerabilities are <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-27198\">CVE-2024-27198<\/a>, an authentication bypass vulnerability with a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS score<\/a> of 9.8, and <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-27199\">CVE-2024-27199<\/a>, a path traversal issue with a CVSS score of 7.3. The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-27198 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. This means that Federal Civilian Executive Branch (FCEB) agencies need to remediate this vulnerability by March 28, 2024 in order to protect their devices against active threats.<\/p>\n<p>These two vulnerabilities allow an attacker to create new administrator accounts on the TeamCity server which have full control over all TeamCity projects, builds, agents and artifacts.<\/p>\n<p>Exploitation code is readily available online and has already been integrated in offensive security tools like the MetaSploit framework.<\/p>\n<p>So, it doesn\u2019t come as a surprise that researchers are now reporting abuse of the vulnerabilities.<\/p>\n<p>Bleeping Computer <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-teamcity-flaw-now-widely-exploited-to-create-admin-accounts\/\">reports<\/a> that attackers have already compromised more than 1,440 instances, while a scan for vulnerable instances by Shadowserver showed that the US and Germany are the most affected countries.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">If running JetBrains TeamCity on-prem &#8211; make sure to patch for latest CVE-2024-27198 (remote auth bypass) &amp; CVE-2024-27199 vulns NOW! <\/p>\n<p>We started seeing exploitation activity for CVE-2024-27198 around Mar 4th 22:00 UTC.  16 IPs seen scanning  so far.<a href=\"https:\/\/t.co\/zZ0iU5MD8S\">https:\/\/t.co\/zZ0iU5MD8S<\/a><\/p>\n<p>&mdash; Shadowserver (@Shadowserver) <a href=\"https:\/\/twitter.com\/Shadowserver\/status\/1764960110659478012?ref_src=twsrc%5Etfw\">March 5, 2024<\/a><\/p><\/blockquote><\/div>\n<\/figure>\n<p>The vulnerabilities affect all TeamCity on-premises versions through 2023.11.3 and were fixed in version 2023.11.4. Customers of TeamCity Cloud have already had their servers patched, and according to JetBrains they weren\u2019t attacked.<\/p>\n<p>To update your server,&nbsp;<a href=\"https:\/\/www.jetbrains.com\/teamcity\/download\/other.html\" target=\"_blank\" rel=\"noreferrer noopener\">download the latest version<\/a>&nbsp;(2023.11.4) or use the&nbsp;<a href=\"https:\/\/www.jetbrains.com\/help\/teamcity\/upgrading-teamcity-server-and-agents.html#Automatic+Update\" target=\"_blank\" rel=\"noreferrer noopener\">automatic update<\/a>&nbsp;option within TeamCity.&nbsp;<\/p>\n<p>JetBrains has also made a security patch plugin available for customers who are unable to upgrade to version 2023.11.4. There are two security patch plugins, one for&nbsp;<a href=\"https:\/\/download.jetbrains.com\/teamcity\/plugins\/internal\/security_patch_2024_02.zip\" target=\"_blank\" rel=\"noreferrer noopener\">TeamCity 2018.2 and newer<\/a>&nbsp;and one for&nbsp;<a href=\"https:\/\/download.jetbrains.com\/teamcity\/plugins\/internal\/security_patch_2024_02_pre2018_2.zip\" target=\"_blank\" rel=\"noreferrer noopener\">TeamCity 2018.1 and older<\/a>. See the&nbsp;<a href=\"https:\/\/www.jetbrains.com\/help\/teamcity\/installing-additional-plugins.html#Installing+Plugin+via+Web+UI\" target=\"_blank\" rel=\"noreferrer noopener\">TeamCity plugin installation instructions<\/a>&nbsp;for information on installing the plugin.<\/p>\n<p>If your server is publicly accessible over the internet, and you are unable to immediately mitigate the issue you should probably make your server inaccessible until you can.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using\u00a0<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">ThreatDown Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/03\/update-now-jetbrains-teamcity-vulnerability-abused-at-scale\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Users of JetBrains TeamCity on-prmises server need to deal with two serious vulnerabilities. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[30989,30990,30991,22783,30992,32,27167],"class_list":["post-24115","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-alternative-path","tag-cve-2024-27198","tag-cve-2024-27199","tag-exploits-and-vulnerabilities","tag-jetbrains-teamcity","tag-news","tag-path-traversal"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24115"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24115\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24115"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}