vendor:
TeamCity
by:
Harrison Neal
9.8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: TeamCity
Affected Version From: 2018.2.4
Affected Version To: 2018.2.4
Patch Exists: YES
Related CWE: CVE-2019-15039
CPE: a:jetbrains:teamcity:2018.2.4
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2020
JetBrains TeamCity 2018.2.4 – Remote Code Execution
The vulnerability exists in the TeamCity server, which allows an attacker to execute malicious code remotely. The exploit code will connect to the TeamCity server and trigger the vulnerable code. To exploit the vulnerability, the attacker needs to have access to a SMB share that the TeamCity software can read from and that the attacker can write to. The attacker then needs to place a malicious POM in the share, which will be executed by the TeamCity server.
Mitigation:
The mitigation for this vulnerability is to upgrade to the latest version of TeamCity, which is 2018.2.5. Additionally, the SMB share should be secured and access should be restricted to only authorized users.