Relative Path Traversal (CWE-23)
A path traversal vulnerability leading to information disclosure was discovered in JetBrains TeamCity versions prior to 2024.07.3. This vulnerability allows attackers to access sensitive information via server backups.
The impact of this vulnerability is primarily on the confidentiality of data. An attacker who successfully exploits this vulnerability could gain unauthorized access to sensitive information stored in server backups. This could potentially lead to the exposure of confidential data, including source code, configuration files, or other critical information managed by TeamCity. The vulnerability has a HIGH confidentiality impact, but no direct impact on integrity or availability of the system.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. JetBrains has addressed this vulnerability in TeamCity version 2024.07.3. To mitigate the risk, users should upgrade to this version or later.
1. Upgrade JetBrains TeamCity to version 2024.07.3 or later as soon as possible. 2. Implement network segmentation to limit access to TeamCity servers only to authorized users and systems. 3. Regularly review and audit server backup configurations and access controls. 4. Monitor for any suspicious activities or unauthorized access attempts related to server backups. 5. Apply the principle of least privilege for all accounts that have access to TeamCity and its backups.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Feedly found the first article mentioning CVE-2024-47948. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-47948
A CVSS base score of 4.9 has been assigned.
EPSS Score was set to: 0.04% (Percentile: 9.7%)
Detection for the vulnerability has been added to Nessus (208723)