In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions in TeamCity server, an attacker can take full control over all TeamCity projects, builds, agents and artifacts, finally the attacker will perfomn a RCE.
git clone https://github.com/jrbH4CK/CVE-2024-27198.git
cd CVE-2024-27198
To create an account as admin privileges inside the server
python3 cve-2024-27198.py http://example.com username password
- The explanation of this vulnerability is on https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/
- Another reference https://nvd.nist.gov/vuln/detail/CVE-2024-27198
- The exploit was tested on JetBrains TeamCity version 2023.05.3 in a controlled environment
- FOR EDUCATIONAL PORPOUSES ONLY