CVE-2024-27198
JetBrains TeamCity vulnerability analysis and mitigation

Summary

CVE-2024-27198 is an authentication bypass vulnerability in TeamCity published on March 5, 2024. On March 7, 2024, CVE-2024-27198 was added to the CISA Known Exploited Vulnerabilities catalog based on evidence of active exploitation. In addition, researchers identified exploitation of CVE-2024-27198 by the BianLian threat group for the deployment of a PowerShell implementation of BianLian’s GO backdoor. It is recommended to look for indicators of compromise in your environment, and if any are identified, remove the files immediately and redeploy workloads from a known clean state.

March 11 update: On March 7, 2024, CVE-2024-27198 was added to the CISA Known Exploited Vulnerabilities catalog based on evidence of active exploitation. In addition, researchers identified exploitation of CVE-2024-27198 by the BianLian threat group for the deployment of a PowerShell implementation of BianLian’s GO backdoor. Indicators of compromise have been added below.

Technical details

CVE-2024-27198

By default, TeamCity exposes a web server via HTTP port 8111 (with the option to configure it for HTTPS). This vulnerability allows an attacker can craft a URL that can circumvent all authentication checks, gaining direct access to endpoints typically requiring authentication. This vulnerability enables a remote, unauthenticated attacker to seize full control of a susceptible TeamCity server.

CVE-2024-27199

This vulnerability permits a restricted level of information disclosure and system modification. This includes the capability for an unauthenticated attacker to substitute the HTTPS certificate on a vulnerable TeamCity server with a certificate of their choosing.

Indicators of compromise

IndicatorTypeDescription
web.ps1FilenamePowerShell Implementation of BianLian GO Backdoor
136[.]0[.]3[.]71IP AddressBianLian C2 Infrastructure
88[.]169[.]109[.]111IP AddressIP Address associated with malicious authentication to TeamCity
165[.]227[.]151[.]123IP AddressIP Address associated with malicious authentication to TeamCity
77[.]75[.]230[.]164IP AddressIP Address associated with malicious authentication to TeamCity
164[.]92[.]243[.]252IP AddressIP Address associated with malicious authentication to TeamCity
64[.]176[.]229[.]97IP AddressIP Address associated with malicious authentication to TeamCity
164[.]92[.]251[.]25IP AddressIP Address associated with malicious authentication to TeamCity
126[.]126[.]112[.]143IP AddressIP Address associated with malicious authentication to TeamCity
38[.]207[.]148[.]147IP AddressIP Address associated with malicious authentication to TeamCity
101[.]53[.]136[.]60IP AddressIP Address associated with malicious authentication to TeamCity
188[.]166[.]236[.]38IP AddressIP Address associated with malicious authentication to TeamCity
185[.]174[.]137[.]26IP AddressIP Address associated with malicious authentication to TeamCity
977ff17cd1fbaf0753d4d5aa892af7aaMD5Web.ps1
1af5616fa3b4d2a384000f83e450e4047f04cb57SHA1Web.ps1
7981cdb91b8bad8b0b894cfb71b090fc9773d830fe110bd4dd8f52549152b448SHA256Web.ps1
hxxp://136[.]0[.]3[.]71:8001/win64.exeURLBianLian C2 Infrastructure
hxxp://136[.]0[.]3[.]71:8001/64.dllURLBianLian C2 Infrastructure

Affected products

All versions of TeamCity On-Premises up to 2023.11.4 are affected by these vulnerabilities.

TeamCity Cloud instances were patched automatically.

Remediation and mitigation

It is recommended to patch TeamCity to the patched version, 2023.11.4, or above.

Workaround

For those unable to update to the patched version at this time, JetBrains provided a "security patch" plugin as an alternative. The security patch plugin can be installed on all TeamCity versions through 2023.11.3. Use the plugin for TeamCity 2018.2 and newer or TeamCity 2018.1 and older, depending on the version you're using.

References


SourceWiz Research

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management