CVE-2024-47160

4.3 MEDIUM

📋 TL;DR

This vulnerability in JetBrains YouTrack allows unauthorized users to access global application configuration data. It affects all YouTrack instances running versions before 2024.3.44799. The issue stems from improper authorization checks for configuration endpoints.

💻 Affected Systems

Products:
  • JetBrains YouTrack
Versions: All versions before 2024.3.44799
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all YouTrack deployments regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive configuration data including system settings, integration credentials, or security parameters, potentially enabling further attacks.

🟠

Likely Case

Unauthorized users viewing configuration details that could reveal system architecture, integration points, or other sensitive operational information.

🟢

If Mitigated

Limited exposure of non-critical configuration data with minimal impact on system security.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires some level of access to the YouTrack instance but bypasses authorization checks for configuration endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.44799

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your YouTrack instance. 2. Download YouTrack 2024.3.44799 or later from JetBrains. 3. Follow the official upgrade guide for your deployment method (Docker, standalone, etc.). 4. Restart the YouTrack service.

🔧 Temporary Workarounds

Restrict network access

all

Limit access to YouTrack administration interfaces to trusted networks only

Review user permissions

all

Audit and minimize user accounts with administrative or configuration access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate YouTrack from untrusted networks
  • Enable detailed audit logging for configuration access attempts and monitor regularly

🔍 How to Verify

Check if Vulnerable:

Check YouTrack version in Administration → System → About. If version is below 2024.3.44799, the system is vulnerable.

Check Version:

For Docker: docker exec youtrack-container cat /opt/youtrack/version.txt

Verify Fix Applied:

After upgrade, verify version is 2024.3.44799 or higher in Administration → System → About.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to configuration endpoints
  • Unusual pattern of GET requests to /api/admin/* endpoints

Network Indicators:

  • Unusual traffic to YouTrack configuration APIs from unauthorized users

SIEM Query:

source="youtrack" AND (uri_path="/api/admin/*" OR uri_path="/rest/admin/*") AND user_role!="admin"

🔗 References

📤 Share & Export