CVE-2024-36376

6.5 MEDIUM

📋 TL;DR

This CVE describes an authorization bypass vulnerability in JetBrains TeamCity where users could perform actions beyond their assigned permissions. It affects TeamCity instances before version 2024.03.2. This could allow unauthorized access to sensitive functionality or data.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2024.03.2
Operating Systems: All platforms running TeamCity
Default Config Vulnerable: ⚠️ Yes
Notes: All TeamCity installations before the patched version are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated user could escalate privileges to administrative level, potentially gaining full control over the TeamCity instance, accessing sensitive build artifacts, modifying configurations, or deploying malicious code.

🟠

Likely Case

Users with limited permissions could access functionality they shouldn't have, such as viewing sensitive build configurations, triggering unauthorized builds, or accessing restricted project data.

🟢

If Mitigated

With proper network segmentation and monitoring, unauthorized actions could be detected and contained before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but the specific bypass mechanism is not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.03.2

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your TeamCity instance. 2. Download TeamCity 2024.03.2 or later from the JetBrains website. 3. Follow the TeamCity upgrade documentation for your installation method. 4. Restart the TeamCity service after upgrade.

🔧 Temporary Workarounds

Temporary access restrictions

all

Implement additional network-level access controls to limit TeamCity access to only authorized users

Enhanced monitoring

all

Increase logging and monitoring of user actions within TeamCity to detect unauthorized activities

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TeamCity from sensitive systems
  • Enable detailed audit logging and implement real-time alerting for suspicious user activities

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration → Server Administration → Server Health → Version

Check Version:

Check TeamCity web interface at Administration → Server Administration → Server Health

Verify Fix Applied:

Verify version is 2024.03.2 or later in the same location

📡 Detection & Monitoring

Log Indicators:

  • Unusual user permission changes
  • Users accessing functionality outside their normal role patterns
  • Failed authorization attempts followed by successful access

Network Indicators:

  • Unusual API calls from non-admin users to administrative endpoints

SIEM Query:

source="teamcity" AND (event_type="permission_violation" OR user_action="unauthorized_access")

🔗 References

📤 Share & Export