JetBrains TeamCity Multiple Vulnerabilities

high Nessus Plugin ID 198226

Synopsis

The remote host is missing one or more security updates.

Description

The version of JetBrains TeamCity installed on the remote host is prior to 2022.04.7, 2022.10.6, 2023.05.6, or 2023.11.5. It is, therefore, affected by multiple vulnerabilities as referenced in the CVE-2024-36363 advisory.

- In JetBrains TeamCity before 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5 several Stored XSS in code inspection reports were possible (CVE-2024-36363)

- In JetBrains TeamCity before 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5 improper access control in Pull Requests and Commit status publisher build features was possible (CVE-2024-36364)

- In JetBrains TeamCity before 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5 an XSS could be executed via certain report grouping and filtering operations (CVE-2024-36366)

- In JetBrains TeamCity before 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5 stored XSS via third-party reports was possible (CVE-2024-36367)

- In JetBrains TeamCity before 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5 reflected XSS via OAuth provider configuration was possible (CVE-2024-36368)

- In JetBrains TeamCity before 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5 stored XSS via issue tracker integration was possible (CVE-2024-36369)

- In JetBrains TeamCity before 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5 stored XSS via OAuth connection settings was possible (CVE-2024-36370)

- In JetBrains TeamCity before 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5 authentication bypass was possible in specific edge cases (CVE-2024-36470)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to JetBrains TeamCity version 2022.04.7 / 2022.10.6 / 2023.05.6 / 2023.11.5 or later.

See Also

https://www.jetbrains.com/privacy-security/issues-fixed/

Plugin Details

Severity: High

ID: 198226

File Name: teamcity_CVE-2024-36363.nasl

Version: 1.1

Type: combined

Agent: windows, macosx, unix

Family: Misc.

Published: 5/31/2024

Updated: 5/31/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2024-36368

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2024-36470

Vulnerability Information

CPE: cpe:/a:jetbrains:teamcity

Required KB Items: installed_sw/JetBrains TeamCity

Exploit Ease: No known exploits are available

Patch Publication Date: 5/29/2024

Vulnerability Publication Date: 5/29/2024

Reference Information

CVE: CVE-2024-36363, CVE-2024-36364, CVE-2024-36366, CVE-2024-36367, CVE-2024-36368, CVE-2024-36369, CVE-2024-36370, CVE-2024-36470