CVE-2024-27199
The target TeamCity instance is vulnerable to CVE-2024-27199
due to its outdated version; 2023.05.4 (build 129421)
A vulnerability was found in JetBrains TeamCity. It has been rated as critical. This issue affects an unknown code. The manipulation with an unknown input leads to a path traversal vulnerability. Using CWE to declare the problem leads to CWE-23. The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ”..” that can resolve to a location that is outside of that directory. Impacted is confidentiality, integrity, and availability.
Exploit
Found an exploit online
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/scrutiny]
└─$ git clone https://github.com/W01fh4cker/CVE-2024-27198-RCE ; python3 -m venv CVE-2024-27198-RCE/.venv ; source CVE-2024-27198-RCE/.venv/bin/activate ; pip3 install requests urllib3 faker
Downloaded and set up the exploit package