CVE-2024-41824

6.4 MEDIUM

📋 TL;DR

This vulnerability in JetBrains TeamCity allows password-type parameters to leak into build logs under specific conditions. It affects organizations using TeamCity for CI/CD pipelines where sensitive credentials are passed as build parameters. The exposure could reveal authentication secrets to users with access to build logs.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2024.07
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific cases where password-type parameters are used in builds and certain conditions trigger log inclusion.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive credentials (database passwords, API keys, deployment tokens) are exposed in build logs, leading to unauthorized access to production systems, data breaches, or lateral movement within the infrastructure.

🟠

Likely Case

Limited credential exposure affecting specific build configurations where password parameters are used, potentially compromising associated services but requiring additional steps for exploitation.

🟢

If Mitigated

With proper access controls and log monitoring, exposure would be limited to authorized users only, reducing the risk of credential misuse.

🌐 Internet-Facing: MEDIUM - While the vulnerability itself doesn't directly expose systems to the internet, exposed credentials could be used to compromise internet-facing services.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with build log access could harvest credentials for lateral movement and privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires access to build logs where password parameters were used.

Exploitation requires existing access to TeamCity build logs, either through legitimate permissions or compromised accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.07 and later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup TeamCity configuration and database. 2. Download TeamCity 2024.07 or later from JetBrains website. 3. Stop TeamCity service. 4. Install the new version following JetBrains upgrade guide. 5. Restart TeamCity service. 6. Verify build logs no longer contain password parameters.

🔧 Temporary Workarounds

Disable detailed build logging

all

Reduce verbosity of build logs to minimize potential exposure of sensitive parameters.

Edit TeamCity configuration to set buildLog.maxBuildLogSize and buildLog.maxBuildLogsPerBuild to lower values

Restrict build log access

all

Limit which users and roles can view build logs containing sensitive information.

Configure TeamCity permissions to restrict 'View build log' permission to necessary users only

🧯 If You Can't Patch

  • Audit all build configurations to identify and remove password parameters from builds where possible
  • Implement credential management solutions (like TeamCity's built-in credentials or external secret managers) instead of passing passwords as build parameters

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version via Administration → Server Administration → Server Health → Version. If version is earlier than 2024.07, system is vulnerable.

Check Version:

Check TeamCity web interface at Administration → Server Administration → Server Health, or examine teamcity-server.log for version information

Verify Fix Applied:

After upgrading to 2024.07 or later, test with a build using password parameters and verify they don't appear in build logs.

📡 Detection & Monitoring

Log Indicators:

  • Password parameters appearing in build logs
  • Sensitive strings in build log entries that should be masked

Network Indicators:

  • Unusual access patterns to build logs from unexpected IPs or users

SIEM Query:

source="teamcity" AND ("password" OR "secret" OR "token") AND log_level="INFO" AND message="build log"

🔗 References

📤 Share & Export