Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.TEAM_CITY_CVE-2024-27199.NBIN
HistoryMar 08, 2024 - 12:00 a.m.

JetBrains TeamCity Path Traversal (CVE-2024-27199)

2024-03-0800:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
24
jetbrains teamcity
path traversal
cve-2024-27199
binary data
scanner

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.4 High

AI Score

Confidence

Low

0.009 Low

EPSS

Percentile

82.8%

A path traversal vulnerability exists in JetBrains TeamCity versions prior to 2023.11.4. An unauthenticated, remote attacker can exploit this, via a specially crafted HTTP GET request, to bypass authentication and perform limited admin actions remotely.

Binary data team_city_cve-2024-27199.nbin
VendorProductVersionCPE
jetbrainsteamcitycpe:/a:jetbrains:teamcity

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

7.4 High

AI Score

Confidence

Low

0.009 Low

EPSS

Percentile

82.8%