CVE-2023-42793
JetBrains TeamCity vulnerability analysis and mitigation

Overview

CVE-2023-42793 is a critical authentication bypass vulnerability discovered in JetBrains TeamCity before version 2023.05.4. The vulnerability was discovered by the Sonar team on September 6, 2023, and publicly disclosed on September 21, 2023. The flaw allows an unauthenticated attacker with HTTP(S) access to a TeamCity server to perform remote code execution (RCE) and gain administrative control of the server. This vulnerability affects all on-premises versions of TeamCity prior to 2023.05.4, while TeamCity Cloud is not affected (Rapid7 Blog, Sonar Blog).

Technical details

The vulnerability stems from a flaw in TeamCity's request interceptor implementation. The system used a wildcard expression '/**/RPC2' that inadvertently allowed bypassing authentication checks for any path ending with /RPC2. This could be exploited through the REST API endpoint for token creation, allowing attackers to create authentication tokens for any user, including administrators. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (Critical), reflecting its high impact and low exploitation complexity (Sonar Blog).

Impact

Successful exploitation of this vulnerability enables attackers to steal source code, access stored service secrets and private keys, control attached build agents, and potentially poison build artifacts. The vulnerability's impact is particularly severe as it affects CI/CD servers, which typically have access to an organization's most valuable assets and can influence the software supply chain (Sonar Blog).

Mitigation and workarounds

JetBrains has released version 2023.05.4 which patches the vulnerability. For customers unable to immediately update, JetBrains has provided security patch plugins that work on TeamCity 8.0+ versions. Two different plugins are available: one for versions 2018.2 to 2023.05.3, and another for versions 8.0 to 2018.1. For TeamCity 2019.2 and later, the plugin can be enabled without restarting the server, while older versions require a restart (JetBrains Blog).

Community reactions

The vulnerability has garnered significant attention in the cybersecurity community due to its critical nature and ease of exploitation. Microsoft reported that multiple North Korean threat actors have been exploiting this vulnerability. The issue was added to CISA's Known Exploited Vulnerabilities Catalog on October 4, 2023, requiring federal agencies to apply mitigations (Rapid7 Blog).

Additional resources


SourceThis report was generated using AI

Related JetBrains TeamCity vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59457HIGH7.7
  • JetBrains TeamCityJetBrains TeamCity
  • cpe:2.3:a:jetbrains:teamcity
NoYesSep 17, 2025
CVE-2025-57734MEDIUM6.5
  • JetBrains TeamCityJetBrains TeamCity
  • cpe:2.3:a:jetbrains:teamcity
NoYesAug 20, 2025
CVE-2025-59456MEDIUM5.5
  • JetBrains TeamCityJetBrains TeamCity
  • cpe:2.3:a:jetbrains:teamcity
NoYesSep 17, 2025
CVE-2025-59455MEDIUM4.2
  • JetBrains TeamCityJetBrains TeamCity
  • cpe:2.3:a:jetbrains:teamcity
NoYesSep 17, 2025
CVE-2025-57733LOW3.8
  • JetBrains TeamCityJetBrains TeamCity
  • cpe:2.3:a:jetbrains:teamcity
NoYesAug 20, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management