9.8
CVE-2024-27198
- EPSS 94.58%
- Veröffentlicht 04.03.2024 18:15:09
- Zuletzt bearbeitet 29.11.2024 16:25:32
- Quelle cve@jetbrains.com
- Teams Watchlist Login
- Unerledigt Login
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
07.03.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog
JetBrains TeamCity Authentication Bypass Vulnerability
SchwachstelleJetBrains TeamCity contains an authentication bypass vulnerability that allows an attacker to perform admin actions.
BeschreibungApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 94.58% | 1 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cve@jetbrains.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.