CVE-2024-27198

In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
Configurations

Configuration 1 (hide)

cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*

History

23 May 2024, 17:57

Type Values Removed Values Added
References () https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive - () https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive - Press/Media Coverage, Third Party Advisory

11 Mar 2024, 15:15

Type Values Removed Values Added
References
  • () https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive -

08 Mar 2024, 02:00

Type Values Removed Values Added
Summary
  • (es) En JetBrains TeamCity antes de 2023.11.4 era posible omitir la autenticación permitiendo realizar acciones administrativas

05 Mar 2024, 19:01

Type Values Removed Values Added
References () https://www.jetbrains.com/privacy-security/issues-fixed/ - () https://www.jetbrains.com/privacy-security/issues-fixed/ - Vendor Advisory
First Time Jetbrains
Jetbrains teamcity
CPE cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other

04 Mar 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-04 18:15

Updated : 2024-05-23 17:57


NVD link : CVE-2024-27198

Mitre link : CVE-2024-27198

CVE.ORG link : CVE-2024-27198


JSON object : View

Products Affected

jetbrains

  • teamcity
CWE
NVD-CWE-Other CWE-288

Authentication Bypass Using an Alternate Path or Channel