CVE-2024-56353

5.5 MEDIUM

📋 TL;DR

JetBrains TeamCity backup files exposed user credentials and session cookies in versions before 2024.12. This vulnerability allows attackers with access to backup files to steal authentication data. Organizations using vulnerable TeamCity versions are affected.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2024.12
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all TeamCity installations with default backup configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to TeamCity instances, potentially compromising CI/CD pipelines and source code repositories.

🟠

Likely Case

Credential theft leading to unauthorized access to TeamCity systems and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if backup files are properly secured with access controls and encryption.

🌐 Internet-Facing: MEDIUM - Backup files could be exposed if misconfigured or through other vulnerabilities.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could access backup files containing credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to backup files, which typically requires some level of system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.12

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Download TeamCity 2024.12 or later from JetBrains website. 2. Backup current configuration. 3. Stop TeamCity service. 4. Install new version. 5. Start TeamCity service. 6. Verify functionality.

🔧 Temporary Workarounds

Secure Backup Files

linux

Apply strict access controls and encryption to TeamCity backup files

chmod 600 /path/to/backup/*
chown teamcity:teamcity /path/to/backup/*

Disable Unnecessary Backups

all

Temporarily disable automated backups until patching

Edit TeamCity configuration to remove backup schedules

🧯 If You Can't Patch

  • Implement strict access controls on backup directories (minimum permissions, separate storage)
  • Enable encryption for all backup files and monitor backup access logs

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration → Server Administration → Global Settings

Check Version:

Check TeamCity web interface or server logs for version information

Verify Fix Applied:

Confirm version is 2024.12 or later and test backup functionality

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to backup files
  • Failed authentication attempts followed by successful logins

Network Indicators:

  • Unusual access patterns to backup storage locations

SIEM Query:

source="teamcity" AND (event="backup_access" OR event="authentication_failure")

🔗 References

📤 Share & Export