How to fix CVE-2024-27198 – Step-by-Step Guide
CVE-2024-27198 is a critical authentication bypass vulnerability affecting JetBrains TeamCity. Published on March 4, 2024, it allows unauthenticated attackers to gain full administrative access. This flaw enables remote code execution, posing a severe risk to affected deployments.
What is JetBrains TeamCity Authentication Bypass?
CVE-2024-27198 is an authentication bypass in JetBrains TeamCity versions < 2023.11.4. It allows unauthenticated attackers to bypass the login via the web UI. Attackers can then create admin accounts and execute arbitrary code, gaining complete control over the TeamCity instance.
Impact and Risks for your Infrastructure
The impact of CVE-2024-27198 is a complete server takeover. Unauthenticated attackers can create admin accounts, execute arbitrary builds, and access all sensitive data including source code and secrets. This leads to severe data breaches, operational disruption, and potential supply chain compromise.
Step-by-Step Mitigation Guide
To mitigate CVE-2024-27198, immediately upgrade your JetBrains TeamCity instance to version 2023.11.4 or later. Verify the upgrade by checking the installed version in the TeamCity UI. After upgrading, monitor logs for any suspicious activity to ensure no compromise occurred prior to patching.
- 1Update TeamCity to 2023.11.4 or later immediately.
- 2Restrict TeamCity web UI access to trusted IP ranges only.
- 3Audit TeamCity user accounts and remove any unauthorized admin accounts.
- 4Rotate all credentials, tokens, and VCS passwords stored in TeamCity.
- 5Review build logs for signs of exploitation (unauthorized builds, new admin accounts).
- 6Enable TeamCity audit logs and set up alerts for admin account creation.