Language:
Severity: Critical
ID: 181926
File Name: teamcity_2023_5_4.nasl
Version: 1.9
Type: remote
Family: Web Servers
Published: 9/27/2023
Updated: 10/25/2024
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Critical
Score: 9.2
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-42793
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:jetbrains:teamcity
Required KB Items: installed_sw/JetBrains TeamCity
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/13/2023
Vulnerability Publication Date: 9/13/2023
CISA Known Exploited Vulnerability Due Dates: 10/25/2023
Core Impact
Metasploit (JetBrains TeamCity Unauthenticated Remote Code Execution)
CVE: CVE-2023-42793, CVE-2023-43566
IAVA: 2023-A-0506-S