
Cloud Vulnerability DB
A community-led vulnerabilities database
In JetBrains TeamCity before version 2023.05.2, a critical security vulnerability was identified where a token with limited permissions could be used to gain full account access. The vulnerability was assigned CVE-2023-39173 and was published on July 25, 2023 (NVD).
The vulnerability is classified with CWE-266 (Incorrect Privilege Assignment) and received varying CVSS v3.1 scores: NVD assigned a HIGH severity score of 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), while JetBrains assessed it as MEDIUM severity with a score of 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N) (NVD).
The vulnerability allows an attacker with limited token permissions to escalate their privileges and gain full account access to the TeamCity system, potentially compromising the security and integrity of the entire system (NVD).
The vulnerability has been patched in TeamCity version 2023.05.2. Users are strongly advised to upgrade to this version or later to mitigate the security risk (JetBrains Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."