Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TEAMCITY_2024_7_1.NASL
HistoryAug 23, 2024 - 12:00 a.m.

JetBrains TeamCity < 2024.07.01 Multiple Vulnerabilities

2024-08-2300:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
2
jetbrains teamcity
vulnerabilities
privilege escalation
stored xss
self xss
reflected xss
clouds
hashicorp vault plugin
aws core plugin
directory permissions
agentpushpreset page
application version number
nessus scanner

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

5.9

Confidence

High

The version of JetBrains TeamCity installed on the remote host is prior to 2024.07.01. It is, therefore, affected by multiple vulnerabilities:

  • In JetBrains TeamCity before 2024.07.1 possible privilege escalation due to incorrect directory permissions (CVE-2024-43114)

  • In JetBrains TeamCity before 2024.07.1 multiple stored XSS was possible on Clouds page (CVE-2024-43807)

  • In JetBrains TeamCity before 2024.07.1 self XSS was possible in the HashiCorp Vault plugin (CVE-2024-43808)

  • In JetBrains TeamCity before 2024.07.1 reflected XSS was possible on the agentPushPreset page (CVE-2024-43809)

  • In JetBrains TeamCity before 2024.07.1 reflected XSS was possible in the AWS Core plugin (CVE-2024-43810)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(206148);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/12");

  script_cve_id(
    "CVE-2024-43114",
    "CVE-2024-43807",
    "CVE-2024-43808",
    "CVE-2024-43809",
    "CVE-2024-43810"
  );
  script_xref(name:"IAVA", value:"2024-A-0509");

  script_name(english:"JetBrains TeamCity < 2024.07.01 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is missing one or more security updates.");
  script_set_attribute(attribute:"description", value:
"The version of JetBrains TeamCity installed on the remote host is prior to 2024.07.01. It is, therefore, affected by
multiple vulnerabilities:

  - In JetBrains TeamCity before 2024.07.1 possible privilege escalation due to incorrect directory
    permissions (CVE-2024-43114)

  - In JetBrains TeamCity before 2024.07.1 multiple stored XSS was possible on Clouds page (CVE-2024-43807)

  - In JetBrains TeamCity before 2024.07.1 self XSS was possible in the HashiCorp Vault plugin
    (CVE-2024-43808)

  - In JetBrains TeamCity before 2024.07.1 reflected XSS was possible on the agentPushPreset page
    (CVE-2024-43809)

  - In JetBrains TeamCity before 2024.07.1 reflected XSS was possible in the AWS Core plugin (CVE-2024-43810)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  # https://www.jetbrains.com/privacy-security/issues-fixed/?product=TeamCity
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?48be73f6");
  script_set_attribute(attribute:"solution", value:
"Upgrade to JetBrains TeamCity version 2024.07.01 or later.");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-43114");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/08/06");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/08/06");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/08/23");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:jetbrains:teamcity");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("jetbrains_teamcity_web_detect.nbin", "jetbrains_teamcity_win_installed.nbin", "jetbrains_teamcity_nix_installed.nbin");
  script_require_keys("installed_sw/JetBrains TeamCity");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::combined_get_app_info(app:'JetBrains TeamCity');

var constraints = [
  { 'fixed_version' : '2024.07.01' }
];

vcf::check_version_and_report(
    app_info:app_info,
    constraints:constraints,
    severity:SECURITY_WARNING,
    flags:{'xss':TRUE}
);

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

5.9

Confidence

High

Related for TEAMCITY_2024_7_1.NASL