CVE-2024-27199
The target TeamCity instance is vulnerable to CVE-2024-27199 due to its outdated version; 2023.05.4 (build 129421)
/Practice/Scrutiny/3-Exploitation/attachments/{FB0CD14E-CC3E-41E0-8FF2-E5D479073537}.png) A vulnerability was found in JetBrains TeamCity. It has been rated as critical. This issue affects an unknown code. The manipulation with an unknown input leads to a path traversal vulnerability. Using CWE to declare the problem leads to CWE-23. The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ”..” that can resolve to a location that is outside of that directory. Impacted is confidentiality, integrity, and availability.
A vulnerability was found in JetBrains TeamCity. It has been rated as critical. This issue affects an unknown code. The manipulation with an unknown input leads to a path traversal vulnerability. Using CWE to declare the problem leads to CWE-23. The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ”..” that can resolve to a location that is outside of that directory. Impacted is confidentiality, integrity, and availability.
Exploit
/Practice/Scrutiny/3-Exploitation/attachments/{D76C0807-8131-4155-A5BA-822670DDE7C3}.png) Found an exploit online
Found an exploit online
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/scrutiny]
└─$ git clone https://github.com/W01fh4cker/CVE-2024-27198-RCE ; python3 -m venv CVE-2024-27198-RCE/.venv ; source CVE-2024-27198-RCE/.venv/bin/activate ; pip3 install requests urllib3 faker Downloaded and set up the exploit package