DIVD-2024-00006 - Authentication Bypass in JetBrains TeamCity
|Upgrade to the latest available version as soon as possible or apply the provided security patch
|Install the JetBrains-provided security patch.
|22 Feb 2024 11:24
A critical security issue was recently identified in TeamCity On-Premises. If abused, the flaw may enable an unauthenticated attacker with HTTP(S) access to a TeamCity server to perform bypass authentication checks and gain administrative control of that TeamCity server.
JetBrains advises On-Prem users to upgrade to the latest available version as soon as possible or install the security patch. See the references for the download links.
What we are doing
DIVD is currently working to identify vulnerable instances and notify the owners of these systems.
|08 Feb 2024
|DIVD starts researching this vulnerability.
|13 Feb 2024
|DIVD found a good fingerprint method
|14 Feb 2024
|DIVD starts scanning the internet for vulnerable instances.
|16 Feb 2024
|DIVD starts notifying network owners with a vulnerable instance in their network.