CVE-2024-27199
- EPSS 90.93%
- Veröffentlicht 04.03.2024 18:15:09
- Zuletzt bearbeitet 21.04.2026 12:48:17
- Quelle cve@jetbrains.com
- CVE-Watchlists
- Unerledigt
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
20.04.2026: CISA Known Exploited Vulnerabilities (KEV) Catalog
JetBrains TeamCity Relative Path Traversal Vulnerability
SchwachstelleJetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.
BeschreibungApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 90.93% | 0.996 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.3 | 3.9 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
| cve@jetbrains.com | 7.3 | 3.9 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.