Patch Now: Critical TeamCity Bug Allows for Server Takeovers

Patch Now: Critical TeamCity Bug Allows for Server Takeovers

February 7, 2024 at 01:33PM

JetBrains has issued a security patch for a critical vulnerability in its TeamCity On-Premises server, which could be exploited by remote attackers to gain control over the server. This impacts all versions from 2017.1 to 2023.11.2. Users are urged to update to the patched version or install a security patch plugin to mitigate the issue.

Based on the meeting notes, the main takeaways are:

– JetBrains has patched a critical security vulnerability, tracked as CVE-2024-23917, in its TeamCity On-Premises server.
– The vulnerability affects all versions from 2017.1 through 2023.11.2 of the TeamCity On-Premises continuous integration and delivery (CI/CD) server.
– The vulnerability allows unauthenticated attackers with HTTP(S) access to bypass authentication checks and gain administrative control of the server.
– JetBrains has released the patched version, TeamCity On-Premises version 2023.11.3, and a security patch plugin for older versions, as alternative mitigation.
– Organizations with affected products are urged to immediately update or use the security patch plugin. If not possible, affected servers should be made inaccessible until the flaw can be mitigated.
– Given the history of exploitation of TeamCity vulnerabilities, organizations are advised to take a longer-term, sustainable approach to vulnerability management beyond just patching.

Let me know if you need any further details or follow-up on this.

Full Article