In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
https://www.theregister.com/2024/03/07/teamcity_exploits_lead_to_ransomware/
https://www.darkreading.com/cyberattacks-data-breaches/jetbrains-teamcity-mass-exploitation-underway-rogue-accounts-thrive
https://www.tenable.com/blog/cve-2024-27198-cve-2024-27199-two-authentication-bypass-vulnerabilities-in-jetbrains-teamcity
https://www.jetbrains.com/privacy-security/issues-fixed/
Source: Mitre, NVD
Published: 2024-03-04
Updated: 2024-12-16
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 7.3
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L