CVE-2025-24461

6.5 MEDIUM

📋 TL;DR

This vulnerability in JetBrains TeamCity allows unauthorized decryption of connection secrets via the Test Connection endpoint. Attackers with access to the endpoint can potentially retrieve sensitive credentials stored in the system. All TeamCity instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2024.12.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all TeamCity installations regardless of configuration. The Test Connection endpoint is typically accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could decrypt and exfiltrate all connection secrets (database credentials, API keys, SSH keys) leading to complete compromise of connected systems and data breaches.

🟠

Likely Case

Unauthorized users with access to the Test Connection endpoint could retrieve specific connection credentials they target, potentially gaining access to external systems.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users who already have some level of access to the system.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Test Connection endpoint, which typically requires authentication. The vulnerability itself is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.12.1

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your TeamCity installation and data. 2. Download TeamCity 2024.12.1 or later from the official JetBrains website. 3. Follow the TeamCity upgrade documentation for your specific installation type. 4. Restart the TeamCity service after upgrade completion.

🔧 Temporary Workarounds

Restrict Test Connection Endpoint Access

all

Limit access to the Test Connection endpoint using network controls or application firewalls

Review and Rotate Connection Secrets

all

Audit all stored connection secrets and rotate credentials for critical systems

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate TeamCity from production systems
  • Enable detailed logging and monitoring for Test Connection endpoint access

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration → Server Administration → Server Health → Version

Check Version:

Check TeamCity web interface at Administration → Server Administration → Server Health → Version

Verify Fix Applied:

Verify version is 2024.12.1 or later in the same location

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to Test Connection endpoint
  • Multiple failed or successful Test Connection attempts from single user

Network Indicators:

  • Unusual outbound connections from TeamCity server following Test Connection requests

SIEM Query:

source="teamcity" AND (uri_path="/app/rest/debug/connectionTest" OR message="Test Connection")

🔗 References

📤 Share & Export