Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-27198 PoC — JetBrains TeamCity 安全漏洞

Source
Associated Vulnerability
Title:JetBrains TeamCity 安全漏洞 (CVE-2024-27198)
Description:JetBrains TeamCity是捷克JetBrains公司的一套分布式构建管理和持续集成工具。该工具提供持续单元测试、代码质量分析和构建问题分析报告等功能。 JetBrains TeamCity 2023.11.4之前版本存在安全漏洞,该漏洞源于存在身份验证绕过漏洞。
Description
A PoC exploit for CVE-2024-27198 - JetBrains TeamCity Authentication Bypass
Readme
# CVE-2024-27198 - JetBrains TeamCity Authentication Bypass

JetBrains TeamCity before 2023.11.4 is affected by an authentication bypass vulnerability that allows unauthorized users to perform admin actions.

### Impact

The vulnerability's exploitation is critical as it grants attackers admin-level access. This access enables them to alter configurations, manage user accounts, access sensitive data, and disrupt the server's operation, posing serious risks to organizations.

## Disclaimer

**Usage Responsibility:** This Proof of Concept (PoC) exploit is provided for educational and research purposes only. Any misuse of this exploit is not condoned and is the sole responsibility of the user. By using this exploit, you acknowledge and accept this responsibility for your actions.
File Snapshot

[4.0K] /data/pocs/837bb74f5cc49edab186766ac9527758318df84f ├── [6.4K] CVE-2024-27198.py └── [ 788] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.