How to fix CVE-2024-27198 – Step-by-Step Guide
CVE-2024-27198, a critical authentication bypass vulnerability in JetBrains TeamCity, allows unauthenticated attackers to gain administrative access. This flaw, with a CVSS score of 10.0, poses a severe risk to affected CI/CD environments.
What is JetBrains TeamCity Authentication Bypass?
CVE-2024-27198 is an authentication bypass in JetBrains TeamCity versions prior to 2023.11.4. Unauthenticated attackers can exploit the web UI to create new administrator accounts. With admin access, they can execute arbitrary code on the server, leading to full system compromise.
Impact and Risks for your Infrastructure
The impact of CVE-2024-27198 is a complete server takeover, enabling unauthenticated attackers to gain full control of the TeamCity instance. This includes access to all source code, build configurations, and sensitive secrets, leading to potential data exfiltration, supply chain attacks, and significant operational disruption.
Step-by-Step Mitigation Guide
To mitigate CVE-2024-27198, immediately upgrade your JetBrains TeamCity instance to version 2023.11.4 or higher. Verify the update by checking your TeamCity server's build number and ensuring it matches the patched version. After upgrading, monitor logs for any suspicious activity or unauthorized access attempts.
- 1Update TeamCity to 2023.11.4 or later immediately.
- 2Restrict TeamCity web UI access to trusted IP ranges only.
- 3Audit TeamCity user accounts and remove any unauthorized admin accounts.
- 4Rotate all credentials, tokens, and VCS passwords stored in TeamCity.
- 5Review build logs for signs of exploitation (unauthorized builds, new admin accounts).
- 6Enable TeamCity audit logs and set up alerts for admin account creation.