CVE-2024-36364

6.5 MEDIUM

📋 TL;DR

This vulnerability in JetBrains TeamCity allows improper access control in Pull Requests and Commit status publisher build features. Attackers could potentially manipulate build processes or access sensitive information. Organizations using affected TeamCity versions are at risk.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: Before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5
Operating Systems: All platforms running TeamCity
Default Config Vulnerable: ⚠️ Yes
Notes: All TeamCity installations using Pull Requests or Commit status publisher build features are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could modify build configurations, inject malicious code into CI/CD pipelines, or access sensitive repository information leading to supply chain compromise.

🟠

Likely Case

Internal users with limited permissions could escalate privileges to modify build features they shouldn't have access to, potentially disrupting development workflows.

🟢

If Mitigated

With proper network segmentation and strict access controls, impact would be limited to authorized users within the TeamCity environment.

🌐 Internet-Facing: MEDIUM - If TeamCity is exposed to the internet, attackers could potentially exploit this after gaining initial access through other means.
🏢 Internal Only: HIGH - This is primarily an internal access control issue that could be exploited by malicious insiders or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some level of access to TeamCity and understanding of build feature configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2022.04.7, 2022.10.6, 2023.05.6, or 2023.11.5 depending on your version track

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your TeamCity installation and database. 2. Download the appropriate patched version from JetBrains website. 3. Stop TeamCity service. 4. Install the update following JetBrains upgrade guide. 5. Restart TeamCity service. 6. Verify functionality.

🔧 Temporary Workarounds

Disable vulnerable build features

all

Temporarily disable Pull Requests and Commit status publisher build features until patching can be completed

Navigate to Administration > Build Features in TeamCity web interface and disable affected features

Restrict access to build configurations

all

Tighten permissions on who can modify build configurations and features

Use TeamCity role-based access control to limit build configuration modifications to essential personnel only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TeamCity from production environments
  • Enable detailed audit logging for all build feature modifications and regularly review logs

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration > Global Settings. If version is before 2022.04.7, 2022.10.6, 2023.05.6, or 2023.11.5, you are vulnerable.

Check Version:

Check via web interface at Administration > Global Settings or via TeamCity REST API at /app/rest/server

Verify Fix Applied:

After patching, verify version shows 2022.04.7, 2022.10.6, 2023.05.6, or 2023.11.5 or later in Administration > Global Settings.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized modifications to build features
  • Unexpected changes to Pull Request or Commit status configurations
  • Failed authentication attempts followed by build feature changes

Network Indicators:

  • Unusual API calls to build feature endpoints from unexpected IP addresses

SIEM Query:

source="teamcity" AND (event_type="build_feature_modified" OR event_type="permission_violation")

🔗 References

📤 Share & Export