Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.TEAMCITY_2022_10_1.NASL
HistorySep 29, 2023 - 12:00 a.m.

TeamCity Server < 2022.10.1 Multiple Vulnerabilities

2023-09-2900:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
8
teamcity
vulnerabilities
internal port scanning
aws access
jetbrains

6.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

31.5%

According to its its self-reported version number, the version of JetBrains TeamCity running on the remote host is a version prior to 2022.10.1. It is, therefore, affected by multiple vulnerabilities:

  • In JetBrains TeamCity between 2022.10 and 2022.10.1 a custom STS endpoint allowed internal port scanning.
    (CVE-2022-46830)

  • In JetBrains TeamCity between 2022.10 and 2022.10.1 connecting to AWS using the ‘Default Credential Provider Chain’ allowed TeamCity project administrators to access AWS resources normally limited to TeamCity system administrators. (CVE-2022-46831)

Note that Nessus did not actually test for these issues, but instead has relied on the version found in the server’s banner.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(182207);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/02");

  script_cve_id("CVE-2022-46830", "CVE-2022-46831");

  script_name(english:"TeamCity Server < 2022.10.1 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its its self-reported version number, the version of JetBrains TeamCity running on the
remote host is a version prior to 2022.10.1. It is, therefore, affected by
multiple vulnerabilities:
    
  - In JetBrains TeamCity between 2022.10 and 2022.10.1 a custom STS endpoint allowed internal port scanning.
    (CVE-2022-46830)

  - In JetBrains TeamCity between 2022.10 and 2022.10.1 connecting to AWS using the 'Default Credential Provider 
    Chain' allowed TeamCity project administrators to access AWS resources normally limited to TeamCity system 
    administrators. (CVE-2022-46831)

Note that Nessus did not actually test for these issues, but instead
has relied on the version found in the server's banner.");
  # https://www.jetbrains.com/privacy-security/issues-fixed/?product=TeamCity&version=2022.10.1
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?aa8db2d7");
  script_set_attribute(attribute:"solution", value:
"Upgrade to JetBrains TeamCity version 2022.10.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:M/C:C/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-46831");
  script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2022-46830");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/12/08");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/12/08");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/09/29");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:jetbrains:teamcity");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("jetbrains_teamcity_web_detect.nbin");
  script_require_keys("installed_sw/JetBrains TeamCity");
  script_require_ports("Services/www", 80, 443);

  exit(0);
}

include('vcf.inc');
include('vcf_extras.inc');

var port = get_http_port(default:80);

var app_info = vcf::get_app_info(app:'JetBrains TeamCity', port:port, webapp:TRUE);

var constraints = [
  { 'min_version': '2022.10', 'fixed_version' : '2022.10.1' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING, flags:{xss:TRUE});
VendorProductVersionCPE
jetbrainsteamcitycpe:/a:jetbrains:teamcity

6.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

31.5%

Related for TEAMCITY_2022_10_1.NASL