Relative Path Traversal (CWE-23)
In JetBrains TeamCity before version 2024.07.3, a path traversal vulnerability allowed backup file write to an arbitrary location. This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-23 (Relative Path Traversal).
This vulnerability has a high integrity impact, potentially allowing attackers to write backup files to arbitrary locations on the system. This could lead to overwriting critical system files, inserting malicious content, or corrupting important data. The attack vector is network-based, requires low attack complexity, and can be executed without user interaction or privileges. While there is no direct impact on confidentiality or availability, the ability to write files to arbitrary locations poses a significant risk to the integrity of the system.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. JetBrains has addressed this vulnerability in TeamCity version 2024.07.3. All versions before 2024.07.3 are considered vulnerable.
1. Immediately update JetBrains TeamCity to version 2024.07.3 or later. 2. If immediate patching is not possible, implement strict input validation and sanitization for file paths. 3. Apply the principle of least privilege to limit the potential impact of exploits. 4. Monitor system logs for any suspicious file write activities. 5. Implement network segmentation to limit access to TeamCity servers. 6. Regularly audit file system permissions and integrity.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Feedly found the first article mentioning CVE-2024-47949. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-47949
A CVSS base score of 4.9 has been assigned.
EPSS Score was set to: 0.04% (Percentile: 9.7%)
Detection for the vulnerability has been added to Nessus (208723)
A CVSS base score of 7.5 has been assigned.