- Description
- In JetBrains TeamCity before 2023.11.3 path traversal allowed reading data within JAR archives
- Source
- cve@jetbrains.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
- Hype score
- Not currently trending
#exploit 1. Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE https://t.co/7QRChKDd85 2. CVE-2024-38819: https://t.co/kYUpa7vaE7 3. CVE-2024-24942: Path traversal in SwaggerUI-java within JetBrains TeamCity https://t.co/XfznvrBobf
@VIPER92929
24 Dec 2024
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit 1. Hacking Kerio Control via CVE-2024-52875: from CRLF Injection to 1-click RCE https://t.co/BsuXNETOpB 2. CVE-2024-38819: https://t.co/ZRhIuNrI2E 3. CVE-2024-24942: Path traversal in SwaggerUI-java within JetBrains TeamCity https://t.co/lfsjbGMLsf
@ksg93rd
22 Dec 2024
307 Impressions
0 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
Diving deep into Jetbrains #TeamCity Part 2 - Analysing CVE-2024-24942 leading to unauthenticated Path Traversal: https://t.co/ydxLVheOCV https://t.co/jL0kt7e16q
@0daylabs
12 Dec 2024
820 Impressions
6 Retweets
16 Likes
4 Bookmarks
0 Replies
1 Quote
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8A42DE00-46DF-4A6D-A913-539C6054945B",
"versionEndExcluding": "2023.11.3"
}
],
"operator": "OR"
}
]
}
]