CVE-2025-59456

5.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to perform path traversal attacks during project archive uploads in JetBrains TeamCity, potentially enabling unauthorized file access or manipulation. Organizations using TeamCity versions before 2025.07.2 are affected by this security flaw.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2025.07.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires upload permissions to a TeamCity project; default configurations with project upload capabilities are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could overwrite critical system files, execute arbitrary code, or access sensitive configuration data by exploiting the path traversal during archive upload.

🟠

Likely Case

Unauthorized file read/write operations within the TeamCity server's filesystem, potentially exposing sensitive project data or configuration files.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to isolated file system access within TeamCity's restricted directories.

🌐 Internet-Facing: MEDIUM - While exploitation requires upload access, internet-facing TeamCity instances increase attack surface.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access with project upload permissions; path traversal techniques must bypass validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.07.2 or later

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: No

Instructions:

1. Backup TeamCity configuration and data. 2. Download TeamCity 2025.07.2 or later from JetBrains website. 3. Follow JetBrains upgrade documentation for your deployment method. 4. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Restrict Project Upload Permissions

all

Temporarily limit upload capabilities to trusted administrators only

TeamCity Admin → Users → Edit Roles → Remove 'Upload project archive' permissions from non-admin users

🧯 If You Can't Patch

  • Implement strict access controls limiting project upload capabilities to essential personnel only
  • Monitor TeamCity logs for unusual upload activities and implement file integrity monitoring on critical directories

🔍 How to Verify

Check if Vulnerable:

Check TeamCity version in Administration → Server Administration → Server Health → Version Information

Check Version:

Check TeamCity web interface or server logs for version information

Verify Fix Applied:

Verify version is 2025.07.2 or later and test project archive upload functionality with path traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file paths in upload logs
  • Failed path traversal attempts in server logs
  • Multiple archive upload attempts from single user

Network Indicators:

  • Unusual upload patterns to TeamCity endpoints
  • Large archive uploads with suspicious filenames

SIEM Query:

source="teamcity" AND (event="upload" OR event="archive") AND (path=".." OR path="../" OR filename CONTAINS "/" OR filename CONTAINS "\")

🔗 References

📤 Share & Export