
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-24936 affects JetBrains TeamCity versions before 2023.11.2, where access control at the S3 Artifact Storage plugin endpoint was missing. The vulnerability was discovered and disclosed in February 2024, with JetBrains issuing a fix in version 2023.11.2 (JetBrains Advisory).
The vulnerability is classified with a CVSS v3.1 Base Score of 5.3 (Medium) according to NIST's assessment, with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. JetBrains' own assessment rated it slightly lower at 4.3 (Medium) with a vector string of CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N. The vulnerability is categorized under CWE-285 (Improper Authorization) (NVD).
The vulnerability could potentially allow unauthorized access to the S3 Artifact Storage plugin endpoint in TeamCity installations. Based on the CVSS scores, the primary impact is related to information disclosure with limited severity (NVD).
The recommended mitigation is to upgrade JetBrains TeamCity to version 2023.11.2 or later, which contains the fix for this vulnerability (JetBrains Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."