OnPremises – INDIA NEWS https://www.indiavpn.org News Blog Tue, 05 Mar 2024 04:04:24 +0000 en-US hourly 1 https://wordpress.org/?v=6.7 Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers https://www.indiavpn.org/2024/03/05/critical-jetbrains-teamcity-on-premises-flaws-could-lead-to-server-takeovers/ https://www.indiavpn.org/2024/03/05/critical-jetbrains-teamcity-on-premises-flaws-could-lead-to-server-takeovers/#respond Tue, 05 Mar 2024 04:04:24 +0000 https://www.indiavpn.org/2024/03/05/critical-jetbrains-teamcity-on-premises-flaws-could-lead-to-server-takeovers/ [ad_1]

Mar 05, 2024NewsroomVulnerability / Network Security

JetBrains TeamCity

A new pair of security vulnerabilities have been disclosed in JetBrains TeamCity On-Premises software that could be exploited by a threat actor to take control of affected systems.

The flaws, tracked as CVE-2024-27198 (CVSS score: 9.8) and CVE-2024-27199 (CVSS score: 7.3), have been addressed in version 2023.11.4. They impact all TeamCity On-Premises versions through 2023.11.3.

“The vulnerabilities may enable an unauthenticated attacker with HTTP(S) access to a TeamCity server to bypass authentication checks and gain administrative control of that TeamCity server,” JetBrains said in an advisory released Monday.

Cybersecurity

TeamCity Cloud instances have already been patched against the two flaws. Cybersecurity firm Rapid7, which discovered and reported the issues on February 20, 2024, said CVE-2024-27198 is a case of authentication bypass that allows for a complete compromise of a susceptible server by a remote unauthenticated attacker.

“Compromising a TeamCity server allows an attacker full control over all TeamCity projects, builds, agents and artifacts, and as such is a suitable vector to position an attacker to perform a supply chain attack,” the company noted.

CVE-2024-27199, also an authentication bypass flaw, stems from a path traversal issue that can permit an unauthenticated attacker to replace the HTTPS certificate in a vulnerable TeamCity server with a certificate of their choosing via the “/app/https/settings/uploadCertificate” endpoint and even alter the port number the HTTPS service listens on.

A threat actor could leverage the vulnerability to perform a denial-of-service against the TeamCity server by either changing the HTTPS port number, or by uploading a certificate that will fail client-side validation. Alternatively, the uploaded certificate could be used for adversary-in-the-middle scenarios if it’s trusted by the clients.

“This authentication bypass allows for a limited number of authenticated endpoints to be reached without authentication,” Rapid7 said of the shortcoming.

Cybersecurity

“An unauthenticated attacker can leverage this vulnerability to both modify a limited number of system settings on the server, as well as disclose a limited amount of sensitive information from the server.”

The development comes nearly a month after JetBrains released fixes to contain another flaw (CVE-2024-23917, CVSS score: 9.8) that could also enable an unauthenticated attacker to gain administrative control of TeamCity servers.

With security vulnerabilities in JetBrains TeamCity having come under active exploitation last year by North Korean and Russian threat actors, it’s essential that users take steps to update their servers immediately.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/03/05/critical-jetbrains-teamcity-on-premises-flaws-could-lead-to-server-takeovers/feed/ 0
Critical JetBrains TeamCity On-Premises Flaw Exposes Servers to Takeover https://www.indiavpn.org/2024/02/07/critical-jetbrains-teamcity-on-premises-flaw-exposes-servers-to-takeover/ https://www.indiavpn.org/2024/02/07/critical-jetbrains-teamcity-on-premises-flaw-exposes-servers-to-takeover/#respond Wed, 07 Feb 2024 06:46:56 +0000 https://www.indiavpn.org/2024/02/07/critical-jetbrains-teamcity-on-premises-flaw-exposes-servers-to-takeover/ [ad_1]

Feb 07, 2024NewsroomCybersecurity / Software Security

TeamCity On-Premises Flaw

JetBrains is alerting customers of a critical security flaw in its TeamCity On-Premises continuous integration and continuous deployment (CI/CD) software that could be exploited by threat actors to take over susceptible instances.

The vulnerability, tracked as CVE-2024-23917, carries a CVSS rating of 9.8 out of 10, indicative of its severity.

“The vulnerability may enable an unauthenticated attacker with HTTP(S) access to a TeamCity server to bypass authentication checks and gain administrative control of that TeamCity server,” the company said.

The issue impacts all TeamCity On-Premises versions from 2017.1 through 2023.11.2. It has been addressed in version 2023.11.3. An unnamed external security researcher has been credited with discovering and reporting the flaw on January 19, 2024.

Cybersecurity

Users who are unable to update their servers to version 2023.11.3 can alternately download a security patch plugin to apply fixes for the flaw.

“If your server is publicly accessible over the internet and you are unable to take one of the above mitigation steps immediately, we recommend temporarily making it inaccessible until mitigation actions have been completed,” JetBrains advised.

While there is no evidence that the shortcoming has been abused in the wild, a similar flaw in the same product (CVE-2023-42793, CVSS score: 9.8) came under active exploitation last year within days of public disclosure by multiple threat actors, including ransomware gangs and state-sponsored groups affiliated with North Korea and Russia.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.



[ad_2]

Source link

]]>
https://www.indiavpn.org/2024/02/07/critical-jetbrains-teamcity-on-premises-flaw-exposes-servers-to-takeover/feed/ 0