CVE-2023-42793
CRITICAL KEV RANSOMWARE NUCLEIJetbrains Teamcity < 2023.05.4 - Missing Authentication
Title source: ruleDescription
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
Exploits (19)
nomisec
WORKING POC
2 stars
by hotplugin0x01 · remote
https://github.com/hotplugin0x01/CVE-2023-42793
nomisec
WORKING POC
1 stars
by syaifulandy · remote
https://github.com/syaifulandy/Nuclei-Template-CVE-2023-42793.yaml
nomisec
WORKING POC
1 stars
by SwiftSecur · remote
https://github.com/SwiftSecur/teamcity-exploit-cve-2023-42793
nomisec
WORKING POC
1 stars
by junnythemarksman · remote
https://github.com/junnythemarksman/CVE-2023-42793
metasploit
WORKING POC
EXCELLENT
by sfewer-r7 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/jetbrains_teamcity_rce_cve_2023_42793.rb
Nuclei Templates (1)
JetBrains TeamCity < 2023.05.4 - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan:
title:TeamCity || http.title:teamcity || http.component:"teamcity"
FOFA:
title=TeamCity || title=teamcity
References (8)
Scores
CVSS v3
9.8
EPSS
0.9291
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2023-10-04
VulnCheck KEV
2023-10-01
InTheWild.io
2023-10-04
ENISA EUVD
EUVD-2023-47222
Ransomware Use
Confirmed
CWE
CWE-306
CWE-288
Status
published
Products (1)
jetbrains/teamcity
< 2023.05.4
Published
Sep 19, 2023
KEV Added
Oct 04, 2023
Tracked Since
Feb 18, 2026