CVE-2025-46433

4.9 MEDIUM

📋 TL;DR

This vulnerability in JetBrains TeamCity allows attackers to bypass path validation in the loggingPreset parameter, potentially enabling unauthorized file access or manipulation. It affects all TeamCity instances running versions before 2025.03.1. Organizations using vulnerable TeamCity versions for CI/CD pipelines are at risk.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2025.03.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the loggingPreset parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could read sensitive configuration files, modify build logs, or potentially write arbitrary files to the server filesystem, leading to data exposure or system compromise.

🟠

Likely Case

Unauthorized access to log files or configuration data, potentially exposing build secrets, credentials, or internal system information.

🟢

If Mitigated

Limited to accessing non-sensitive files within the TeamCity directory structure if proper file permissions are configured.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of TeamCity's loggingPreset parameter and path traversal techniques. No public exploits have been reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.03.1

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your TeamCity configuration and data. 2. Download TeamCity 2025.03.1 from the official JetBrains website. 3. Stop the TeamCity service. 4. Install the new version following JetBrains upgrade documentation. 5. Restart the TeamCity service. 6. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict access to TeamCity interface

all

Limit access to TeamCity web interface to trusted IP addresses only

Configure firewall rules or web server access controls

Implement strict file permissions

linux

Set restrictive permissions on TeamCity data directories

chmod 750 /path/to/teamcity/data
chown teamcity:teamcity /path/to/teamcity/data

🧯 If You Can't Patch

  • Implement network segmentation to isolate TeamCity servers from sensitive systems
  • Enable detailed audit logging and monitor for unusual file access patterns

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration → Server Administration → Server Information. If version is below 2025.03.1, the system is vulnerable.

Check Version:

Check web interface at Administration → Server Administration → Server Information

Verify Fix Applied:

After upgrading, verify the version shows 2025.03.1 or higher in the same location. Test that loggingPreset parameter validation is working correctly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in access logs
  • Multiple failed attempts with path traversal patterns in loggingPreset parameter

Network Indicators:

  • Unusual requests to loggingPreset endpoint with path traversal sequences

SIEM Query:

source="teamcity" AND (uri="*loggingPreset*" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*"))

🔗 References

📤 Share & Export