CVE-2022-24442

9.8 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Template Injection (SSTI) vulnerability in JetBrains YouTrack that allows attackers to execute arbitrary code on the server. It affects YouTrack instances running versions before 2021.4.40426. Attackers can exploit this to gain full control of affected systems.

💻 Affected Systems

Products:
  • JetBrains YouTrack
Versions: All versions before 2021.4.40426
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All YouTrack deployments using affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, data theft, privilege escalation, and lateral movement within the network.

🟠

Likely Case

Remote code execution leading to data exfiltration, installation of backdoors, or ransomware deployment.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place, though exploitation could still occur.

🌐 Internet-Facing: HIGH - Internet-facing YouTrack instances are directly exploitable without authentication.
🏢 Internal Only: HIGH - Internal instances are still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SSTI vulnerabilities in FreeMarker are well-documented and easily weaponized. Public exploit code exists for similar vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.4.40426 and later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your YouTrack data and configuration. 2. Download YouTrack 2021.4.40426 or later from JetBrains website. 3. Stop the YouTrack service. 4. Install the updated version. 5. Start the YouTrack service. 6. Verify the version is 2021.4.40426 or higher.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to YouTrack instances to only trusted IP addresses

# Use firewall rules to restrict access
iptables -A INPUT -p tcp --dport 8080 -s trusted_ip_range -j ACCEPT
iptables -A INPUT -p tcp --dport 8080 -j DROP

Disable Unnecessary Features

all

Disable FreeMarker template functionality if not required

# Modify YouTrack configuration to disable FreeMarker
# Edit youtrack.xml or configuration files to remove FreeMarker support

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to isolate YouTrack instances
  • Deploy web application firewall (WAF) with SSTI detection rules and enable enhanced logging

🔍 How to Verify

Check if Vulnerable:

Check the YouTrack version in the web interface under Administration → Global Settings → About, or run: java -jar youtrack.jar --version

Check Version:

java -jar youtrack.jar --version

Verify Fix Applied:

Verify the version is 2021.4.40426 or higher using the same methods, and test that FreeMarker template injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FreeMarker template processing errors
  • Suspicious POST requests containing template syntax
  • Unexpected process execution from YouTrack service

Network Indicators:

  • HTTP requests containing FreeMarker template injection payloads
  • Outbound connections from YouTrack to unexpected destinations

SIEM Query:

source="youtrack.log" AND ("freemarker" OR "template") AND (error OR exception OR "unexpected")

🔗 References

📤 Share & Export