CVE-2024-27199

HIGH EXPLOITED IN THE WILD RANSOMWARE NUCLEI

TeamCity < 2023.11.4 - Authentication Bypass

Title source: nuclei

Description

In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible

Exploits (2)

github WORKING POC 34 stars
by Stuub · pythonremote
https://github.com/Stuub/RCity-CVE-2024-27198
vulncheck_xdb WORKING POC
remote
https://github.com/W01fh4cker/CVE-2024-27198-RCE

Nuclei Templates (1)

TeamCity < 2023.11.4 - Authentication Bypass
HIGHVERIFIEDby DhiyaneshDk
Shodan: http.component:"TeamCity"

Scores

CVSS v3 7.3
EPSS 0.9449
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Exploitation Intel

VulnCheck KEV 2024-03-05
InTheWild.io 2024-03-04
Ransomware Use Confirmed

Classification

CWE
CWE-22 CWE-23
Status published

Affected Products (1)

jetbrains/teamcity < 2023.11.4

Timeline

Published Mar 04, 2024
Tracked Since Feb 18, 2026