HomeCyber Balkans1000+ JetBrains TeamCity Instances at Risk of RCE Attacks

1000+ JetBrains TeamCity Instances at Risk of RCE Attacks

Published on

spot_img

A critical security vulnerability has been identified in TeamCity On-Premises, with the tag CVE-2024-23917 and a CVSS score of 9.8. The flaw allows unauthenticated attackers with HTTP(S) access to a TeamCity server to bypass authentication procedures and seize administrative control. This poses a significant risk as it could potentially enable remote code execution (RCE) attacks without user input.

TeamCity, a building management and continuous integration server developed by JetBrains, can be installed on-premises or used as a cloud service. The vulnerability, identified as an Authentication Bypass Using an Alternate Path or Channel (CWE-288), affects all TeamCity On-Premises versions from 2017.1 through 2023.11.2. It is important to note that TeamCity Cloud servers have already been patched and verified to be secure.

Shadowserver has observed that 1052 vulnerable JetBrains TeamCity Instances were exposed to the Internet. The majority of the exposed instances are located in the US, with 332 instances, and Germany, with 120 instances. The issue has been addressed in version 2023.11.3, and JetBrains has already notified its customers.

In light of the security vulnerability, JetBrains strongly advises all TeamCity On-Premises users to update their servers to version 2023.11.3 in order to eliminate the exposure to the vulnerability. For those who are unable to update their servers immediately, JetBrains has released a security patch plugin that allows the environment to continue to be patched.

The security patch plugin can be found here:
– For TeamCity 2018.2+: https://gbhackers.com/1000-jetbrains-teamcity-instances/
– For TeamCity 2017.1, 2017.2, and 2018.1: https://gbhackers.com/1000-jetbrains-teamcity-instances/

If it is not possible to apply the mitigation steps immediately, JetBrains recommends temporarily making the server inaccessible over the internet until the necessary actions have been taken.

It is recommended to keep up-to-date on cybersecurity news and developments by following The Cybersecurity News on LinkedIn and Twitter for the latest updates.

Source link

Latest articles

Deepfake Era Requires Proof-Based Security Over Mere Awareness

The Growing Threat of Deepfake Attacks: A Call for Enhanced Security Measures For years, cybercriminals...

Researchers Discover 10 Real-World Indirect Prompt Injection Attacks

Security Researchers Identify New Indirect Prompt Injection Threats Targeting AI Systems In a recent discovery,...

Doctor Lobby Urges Congress to Implement Safeguards for AI Chatbots

AMA Advocates for Essential Safeguards for AI Chatbots in Mental Health Care The American Medical...

UK Court Supports Facial Recognition Policy

The High Court of Justice in the United Kingdom has recently upheld the Metropolitan...

More like this

Deepfake Era Requires Proof-Based Security Over Mere Awareness

The Growing Threat of Deepfake Attacks: A Call for Enhanced Security Measures For years, cybercriminals...

Researchers Discover 10 Real-World Indirect Prompt Injection Attacks

Security Researchers Identify New Indirect Prompt Injection Threats Targeting AI Systems In a recent discovery,...

Doctor Lobby Urges Congress to Implement Safeguards for AI Chatbots

AMA Advocates for Essential Safeguards for AI Chatbots in Mental Health Care The American Medical...