CVE-2024-43114

7.5 HIGH

📋 TL;DR

This vulnerability in JetBrains TeamCity allows attackers to escalate privileges due to incorrect directory permissions. It affects all TeamCity installations before version 2024.07.1. Attackers could potentially gain unauthorized access to sensitive system resources.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2024.07.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability stems from improper directory permissions that could allow privilege escalation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where attackers gain administrative control over the TeamCity server, potentially accessing build secrets, source code, and deploying malicious artifacts.

🟠

Likely Case

Unauthorized access to sensitive configuration files, build artifacts, or credentials stored in TeamCity directories, leading to data exposure or further lateral movement.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though directory permission issues could still expose some configuration data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some level of access to the TeamCity instance. The vulnerability involves directory permission manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.07.1

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your TeamCity configuration and data. 2. Download TeamCity 2024.07.1 from the official JetBrains website. 3. Stop the TeamCity service. 4. Install the new version following JetBrains upgrade documentation. 5. Restart the TeamCity service. 6. Verify the upgrade was successful.

🔧 Temporary Workarounds

Manual Directory Permission Fix

linux

Manually adjust directory permissions to restrict unauthorized access while waiting for patch deployment.

chmod 750 /opt/teamcity/data
chmod 750 /opt/teamcity/logs
chown -R teamcity:teamcity /opt/teamcity

🧯 If You Can't Patch

  • Implement strict network access controls to limit TeamCity server exposure
  • Enable detailed audit logging for all directory access attempts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version via web interface or server logs. If version is below 2024.07.1, the system is vulnerable.

Check Version:

Check TeamCity web interface or view server startup logs for version information.

Verify Fix Applied:

Verify TeamCity version is 2024.07.1 or higher and check directory permissions are properly set.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized directory access attempts
  • Permission denied errors in system logs
  • Unusual file access patterns in TeamCity directories

Network Indicators:

  • Unusual outbound connections from TeamCity server
  • Suspicious authentication attempts

SIEM Query:

source="teamcity.logs" AND (event="permission_denied" OR event="unauthorized_access")

🔗 References

📤 Share & Export