CVE-2025-68268

5.4 MEDIUM

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the JetBrains TeamCity storage settings page, which are then executed in victims' browsers when they view the page. It affects all TeamCity instances running versions before 2025.11.1. Attackers could steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • JetBrains TeamCity
Versions: All versions before 2025.11.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All TeamCity installations with the storage settings page accessible are vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full control of TeamCity instance, compromises build pipelines, and potentially accesses source code and credentials stored in the CI/CD system.

🟠

Likely Case

Attacker steals user session cookies to gain unauthorized access to TeamCity, potentially modifying build configurations or accessing sensitive build artifacts.

🟢

If Mitigated

With proper input validation and output encoding, the malicious script would be rendered harmless as text rather than executed code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Reflected XSS typically requires user interaction (clicking a malicious link) but is straightforward to exploit once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.11.1

Vendor Advisory: https://www.jetbrains.com/privacy-security/issues-fixed/

Restart Required: Yes

Instructions:

1. Backup your TeamCity instance. 2. Download TeamCity 2025.11.1 or later from the JetBrains website. 3. Stop the TeamCity service. 4. Install the new version following JetBrains upgrade documentation. 5. Restart the TeamCity service. 6. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict access to storage settings

all

Limit access to the storage settings page to only necessary administrators using network controls or authentication.

Implement WAF rules

all

Deploy a web application firewall with XSS detection rules to block malicious payloads.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources.
  • Use browser security extensions or network segmentation to limit access to the TeamCity instance.

🔍 How to Verify

Check if Vulnerable:

Check your TeamCity version in the administration interface. If it's below 2025.11.1, you are vulnerable.

Check Version:

Check the TeamCity web interface under Administration → Global Settings, or examine the TeamCity server logs for version information.

Verify Fix Applied:

After upgrading, confirm the version shows 2025.11.1 or higher in the administration interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to storage settings page with script-like parameters
  • Multiple failed authentication attempts followed by storage settings access

Network Indicators:

  • HTTP requests containing script tags or JavaScript in URL parameters to the storage settings endpoint

SIEM Query:

source="teamcity" AND (url="*/admin/storageSettings.html*" AND (param="*<script>*" OR param="*javascript:*"))

🔗 References

📤 Share & Export