CVE-2025-46433
📋 TL;DR
This vulnerability in JetBrains TeamCity allows attackers to bypass path validation in the loggingPreset parameter, potentially enabling unauthorized file access or manipulation. It affects all TeamCity instances running versions before 2025.03.1. Organizations using vulnerable TeamCity versions for CI/CD pipelines are at risk.
💻 Affected Systems
- JetBrains TeamCity
📦 What is this software?
Teamcity by Jetbrains
⚠️ Risk & Real-World Impact
Worst Case
An attacker could read sensitive configuration files, modify build logs, or potentially write arbitrary files to the server filesystem, leading to data exposure or system compromise.
Likely Case
Unauthorized access to log files or configuration data, potentially exposing build secrets, credentials, or internal system information.
If Mitigated
Limited to accessing non-sensitive files within the TeamCity directory structure if proper file permissions are configured.
🎯 Exploit Status
Exploitation requires understanding of TeamCity's loggingPreset parameter and path traversal techniques. No public exploits have been reported.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2025.03.1
Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/
Restart Required: Yes
Instructions:
1. Backup your TeamCity configuration and data. 2. Download TeamCity 2025.03.1 from the official JetBrains website. 3. Stop the TeamCity service. 4. Install the new version following JetBrains upgrade documentation. 5. Restart the TeamCity service. 6. Verify the upgrade was successful.
🔧 Temporary Workarounds
Restrict access to TeamCity interface
allLimit access to TeamCity web interface to trusted IP addresses only
Configure firewall rules or web server access controls
Implement strict file permissions
linuxSet restrictive permissions on TeamCity data directories
chmod 750 /path/to/teamcity/data
chown teamcity:teamcity /path/to/teamcity/data
🧯 If You Can't Patch
- Implement network segmentation to isolate TeamCity servers from sensitive systems
- Enable detailed audit logging and monitor for unusual file access patterns
🔍 How to Verify
Check if Vulnerable:
Check TeamCity version in Administration → Server Administration → Server Information. If version is below 2025.03.1, the system is vulnerable.
Check Version:
Check web interface at Administration → Server Administration → Server Information
Verify Fix Applied:
After upgrading, verify the version shows 2025.03.1 or higher in the same location. Test that loggingPreset parameter validation is working correctly.
📡 Detection & Monitoring
Log Indicators:
- Unusual file path patterns in access logs
- Multiple failed attempts with path traversal patterns in loggingPreset parameter
Network Indicators:
- Unusual requests to loggingPreset endpoint with path traversal sequences
SIEM Query:
source="teamcity" AND (uri="*loggingPreset*" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*"))