CVE-2020-35667

7.5 HIGH

📋 TL;DR

CVE-2020-35667 is a Server-Side Request Forgery (SSRF) vulnerability in JetBrains TeamCity Plugin that allows attackers to make unauthorized requests from the server to internal systems. This could expose user credentials and other sensitive data. Organizations using vulnerable versions of TeamCity Plugin are affected.

💻 Affected Systems

Products:
  • JetBrains TeamCity Plugin
Versions: All versions before 2020.2.85695
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects TeamCity Plugin installations regardless of underlying OS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal systems, steal credentials, pivot to other network resources, and potentially achieve remote code execution.

🟠

Likely Case

Credential theft from internal services, unauthorized access to metadata services, and data exfiltration from internal APIs.

🟢

If Mitigated

Limited impact with proper network segmentation, egress filtering, and authentication controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SSRF vulnerabilities are commonly exploited and tooling exists for automated exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2020.2.85695 and later

Vendor Advisory: https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/

Restart Required: Yes

Instructions:

1. Update TeamCity Plugin to version 2020.2.85695 or later. 2. Restart TeamCity server. 3. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict TeamCity server's outbound network access to only necessary services

Egress Filtering

all

Implement firewall rules to block unauthorized outbound requests from TeamCity server

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TeamCity from sensitive internal systems
  • Deploy web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check TeamCity Plugin version in Administration → Plugins list

Check Version:

Check via TeamCity web interface: Administration → Plugins

Verify Fix Applied:

Confirm plugin version is 2020.2.85695 or higher in Administration → Plugins

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from TeamCity server
  • Requests to internal metadata services (169.254.169.254, etc.)
  • Failed authentication attempts from TeamCity IP

Network Indicators:

  • TeamCity server making unexpected outbound HTTP/HTTPS requests
  • Requests to internal-only IP ranges from TeamCity

SIEM Query:

source_ip="TeamCity_Server_IP" AND (dest_ip IN internal_ranges OR dest_host LIKE "%.internal" OR dest_ip="169.254.169.254")

🔗 References

📤 Share & Export