CVE-2024-35299

5.9 MEDIUM

📋 TL;DR

This vulnerability in JetBrains YouTrack allows man-in-the-middle attacks due to improper certificate hostname validation in SMTPS protocol communication. Attackers could intercept or manipulate email communications sent through YouTrack's SMTPS functionality. Organizations using YouTrack for email notifications with SMTPS are affected.

💻 Affected Systems

Products:
  • JetBrains YouTrack
Versions: All versions before 2024.1.29548
Operating Systems: All platforms running YouTrack
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using SMTPS protocol for email communications

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept sensitive email communications, inject malicious content, or steal credentials transmitted via email notifications from YouTrack.

🟠

Likely Case

Email communications could be intercepted or manipulated, potentially exposing sensitive information or enabling phishing attacks.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential email interception within controlled environments.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires man-in-the-middle position on network path between YouTrack and SMTP server

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1.29548 or later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup YouTrack data and configuration. 2. Download YouTrack 2024.1.29548 or later from JetBrains website. 3. Stop YouTrack service. 4. Install the updated version. 5. Start YouTrack service. 6. Verify functionality.

🔧 Temporary Workarounds

Disable SMTPS

all

Switch to alternative email protocols or disable email notifications

Edit YouTrack configuration to use non-SMTPS email settings or disable email features

Network Segmentation

all

Isolate YouTrack from untrusted networks

Configure firewall rules to restrict YouTrack SMTP traffic to trusted paths only

🧯 If You Can't Patch

  • Implement strict network controls to prevent man-in-the-middle attacks on SMTP traffic
  • Monitor network traffic for suspicious SMTP interception attempts

🔍 How to Verify

Check if Vulnerable:

Check YouTrack version in administration panel or via API

Check Version:

Check YouTrack web interface Administration → System → Version or use API endpoint /api/admin/version

Verify Fix Applied:

Confirm version is 2024.1.29548 or later and test SMTPS functionality

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validation in YouTrack logs
  • Unusual SMTP connection patterns

Network Indicators:

  • Unexpected SSL/TLS certificate mismatches in SMTP traffic
  • Man-in-the-middle patterns in network traffic

SIEM Query:

source="youtrack" AND ("certificate" OR "SMTPS") AND ("failed" OR "invalid" OR "mismatch")

🔗 References

📤 Share & Export