CVE-2025-24457

5.5 MEDIUM

📋 TL;DR

JetBrains YouTrack versions before 2024.3.55417 expose permanent authentication tokens in application logs. This vulnerability allows attackers with access to log files to steal tokens and impersonate users. All YouTrack instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • JetBrains YouTrack
Versions: All versions before 2024.3.55417
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all YouTrack deployments regardless of configuration. Permanent tokens are used for API access and integrations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to YouTrack, potentially compromising all project data, user accounts, and using the system as a foothold for further attacks.

🟠

Likely Case

Unauthorized users access sensitive project data, modify issues, or impersonate legitimate users for privilege escalation.

🟢

If Mitigated

Limited exposure of non-critical user data if logs are properly secured and monitored.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires log access, internet-facing instances have broader attack surface for log exposure.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could access logs to steal tokens for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires only read access to log files where tokens are exposed.

Exploitation depends on log file accessibility. No authentication bypass needed if logs are accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.55417

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your YouTrack instance. 2. Download YouTrack 2024.3.55417 or later from JetBrains website. 3. Stop the YouTrack service. 4. Install the updated version. 5. Restart the YouTrack service. 6. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Log File Access

linux

Set strict file permissions on YouTrack log directories to prevent unauthorized access.

chmod 640 /path/to/youtrack/logs/*
chown youtrack:youtrack /path/to/youtrack/logs/*

Rotate Permanent Tokens

all

Revoke and regenerate all permanent tokens to invalidate any potentially exposed tokens.

🧯 If You Can't Patch

  • Implement strict access controls on log directories (read-only for essential services only)
  • Enable log monitoring and alerting for suspicious access patterns to log files

🔍 How to Verify

Check if Vulnerable:

Check YouTrack version in Administration → System → About. If version is below 2024.3.55417, you are vulnerable.

Check Version:

Check web interface at /admin/about or examine youtrack.log for version information

Verify Fix Applied:

Confirm version is 2024.3.55417 or higher in Administration → System → About. Check logs no longer contain permanent token strings.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to log files
  • Patterns of token strings in unexpected log entries
  • Multiple failed attempts to access log directories

Network Indicators:

  • Unusual API requests using permanent tokens
  • Authentication attempts from unexpected locations

SIEM Query:

source="youtrack.log" AND "permanent token" OR source="system.auth" AND event="token_usage" AND location!=expected

🔗 References

📤 Share & Export