Publicly available exploits incite unwarranted chaos
Executive Summary
On March 4, 2024, JetBrains released a blog post detailing the security patch for TeamCity, which is a Continuous Integration and Continuous Delivery (CI/CD) server developed by JetBrains and plays a crucial role within organizations across the globe.
The official vendor released the following bug fixes for two Authentication Bypass vulnerabilities (CVE-2024-27198 and CVE-2024-27199). Shortly, preliminary exploit codes for the vulnerability impacting TeamCity JetBrains were released by the Rapid7 team.
Weighing the criticality of the impacted product and past exploitation of JetBrains (CVE-2023-42793) by the Russian Foreign Intelligence Service (SVR) and two North Korean nation-state threat actors, Diamond Sleet and Onyx Sleet (having the capability of successfully launching supply chain attacks), Cyble Research and Intelligence Labs (CRIL) researchers were actively monitoring the chain of events over the surface, deep and dark web. The investigation led CRIL researchers to observe active exploitation attempts of CVE-2024-27198 detected on Cyble Global Sensor Intelligence (CGSI) from March 5, 2024 onwards.
CRIL researchers also picked up certain activities in the underground that indicate the aftereffects of unpatched JetBrains assets being exploited.
Vulnerability Details
The Authentication Bypass vulnerabilities were discovered by Rapid7 in February 2024. The vulnerabilities CVE-2024-27198 and CVE-2024-27199 fall under the critical and high severity categories, respectively. These vulnerabilities affects all versions of TeamCity On-Premises before version 2023.11.4.
CVE-2024-27198: An authentication bypass vulnerability in the web component of the affected versions of TeamCity that stems from an alternative path issue. An unauthenticated attacker can craft a URL, bypassing authentication checks, which provides them with access to restricted endpoints.
CVE-2024-27199: An authentication bypass vulnerability in the TeamCity web server. A limited number of authenticated endpoints are reachable to unauthenticated attackers due to the path traversal issue impacting the following paths (which may extend beyond these).
/res/
/update/
/.well-known/acme-challenge/
By utilizing the above paths and exploiting the path traversal issue, an attacker can traverse to an alternative endpoint such as:
/app/availableRunners
/app/https/settings/setPort
/app/https/settings/certificateInfo
/app/https/settings/defaultHttpsPort
/app/https/settings/fetchFromAcme
/app/https/settings/removeCertificate
/app/https/settings/uploadCertificate
/app/https/settings/termsOfService
/app/https/settings/triggerAcmeChallenge
/app/https/settings/cancelAcmeChallenge
/app/https/settings/getAcmeOrder
/app/https/settings/setRedirectStrategy
/app/pipeline
/app/oauth/space/createBuild.html
The exploitation of the vulnerability allows modification of a limited number of system configuration on the server and limited disclosure of sensitive information from the server.
TeamCity has released a patch to mitigate both vulnerabilities. Customers can also utilize the automatic update option within TeamCity or the security patch plugin as an alternative.
Internet Exposure of TeamCity
During blog publication, Cyble’s Odin Scanner indicated 1,780 internet-exposed TeamCity instances (as shown below). Most of the instances were geolocated in the United States, Ireland, and Germany.
Figure 1 – Internet Exposure for TeamCity via ODIN Scanner
**Note: Internet exposed assets do not indicate vulnerable instances but rather provide a view of the attack surface visible to attackers.
Cyble Global Sensor Intelligence Findings
Cyble Global Sensor Intelligence (CGSI) observed exploitation attempts of CVE-2024-27198 on March 5, 2024, and onwards. In one of the captured instances captured by CGSI as shown in the figure below, an attacker is attempting to access an authenticated endpoint /app/rest/server by requesting a non-existent resource /hax, appending an HTTP query string ?jsp=/app/rest/server, and further ensuring the arbitrary URI path ends with .jsp by appending an HTTP path parameter segment ;.jsp.
Figure 2 – Screenshot of exploitation attempts observed via CGSI network
Threat actors attempting to exploit vulnerabilities within 24-48 hours of its public disclosure indicates weaponizing publicly available proof-of-concepts, and exploits. The swift action by threat actors challenges the time frame typically required for the organizations to implement patches effectively and emphasize on the proactive countermeasures.
Activities in the Underground
CRIL has been highlighting the impact of such vulnerability disclosures, and TAs utilize the instant availability of their POCs to mass exploit them to gain initial access to unpatched applications.
In this particular instance, vulnerabilities within TeamCity JetBrains have begun to show indications of exploitation and their compromised access sale by IABs in the underground.
A recent post from a nefarious cybercrime forum indicates how quickly TAs try to monetize such cybersecurity developments.
Figure 3 – Screenshot of TA selling TeamCity access over underground forums
Conclusion
The vulnerabilities present in TeamCity by JetBrains demand immediate attention for patching, given that both are authentication bypass vulnerabilities. CVE-2024-27199 has the potential to enable attackers to execute denial-of-service attacks on TeamCity servers and perform man-in-the-middle attacks on client connections. Additionally, CVE-2024-27198 poses a significant risk by allowing a complete compromise of vulnerable TeamCity servers.
The active exploitation attacks witnessed by Cyble Global Sensor Intelligence, the availability of public exploit codes, the presence of internet-exposed TeamCity instances, and the sale of compromised JetBrains access over underground forums collectively highlight the threat emerged by recent vulnerabilities.
Recommendations
- Keeping software’s, firmware, applications updated with the recent patches and mitigations released by official vendor is necessary to prevent attackers in exploiting vulnerabilities.
- Minimize network exposure for all control system devices and/or systems by implementing proper network segmentation and ensuring they are not accessible from the Internet.
- Regular audits , vulnerability assessments, and pentesting exercises are key to address security loopholes that may be susceptible to attacks.
- By default, the TeamCity log files are located in C:TeamCitylogs on Windows and /opt/TeamCity/logs/ on Linux, which can be utilized for monitoring purposes.
Indicators of Compromise (IOC)
Indicators | Indicator Type | Description |
143[.]198[.]150[.]42 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
170[.]64[.]155[.]123 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
165[.]22[.]159[.]187 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
192[.]34[.]62[.]65 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
45[.]55[.]194[.]62 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
24[.]144[.]82[.]64 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
167[.]99[.]48[.]60 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
157[.]230[.]15[.]25 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
170[.]64[.]157[.]36 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
170[.]64[.]220[.]72 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
188[.]166[.]148[.]243 | IP Address | IP observed attempting to exploit CVE-2024-27198 |
Reference Links
https://blog.jetbrains.com/teamcity/2024/03/teamcity-2023-11-4-is-out
https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now
https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed
https://www.jetbrains.com/privacy-security/issues-fixed
Multiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a
The post JetBrains TeamCity Authentication Bypass vulnerability under Active Exploitation appeared first on Cyble.
Source: Original Post
MITRE TTP :
- T1190 – Exploit Public-Facing Application: The attackers are exploiting vulnerabilities in TeamCity, a public-facing CI/CD server, to bypass authentication and gain access to restricted endpoints.
- T1068 – Exploitation for Privilege Escalation: By exploiting the authentication bypass vulnerabilities, attackers could potentially escalate privileges and gain unauthorized access to sensitive information or modify system configurations on the server.
- T1210 – Exploitation of Remote Services: The vulnerabilities allow attackers to exploit remote services by crafting malicious URLs to bypass authentication checks.
- T1566 – Phishing: While not directly related to the exploitation of the vulnerabilities, the initial vector for gaining access to the JetBrains assets could involve phishing techniques to compromise developer accounts and distribute malicious applications.
- T1199 – Trusted Relationship: The exploitation of these vulnerabilities and the potential compromise of TeamCity servers could lead to further attacks that exploit trusted relationships between the CI/CD server and other systems within the organization’s network.
- T1588 – Obtain Capabilities: The rapid weaponization of publicly available proof-of-concept exploits indicates that threat actors are obtaining capabilities that allow them to quickly target unpatched systems.
- T1105 – Ingress Tool Transfer: The observed activities in the underground forums, where compromised TeamCity access is being sold, suggest that attackers are transferring tools or access credentials to other malicious actors.
- T1071 – Application Layer Protocol: The exploitation attempts observed involve the use of HTTP query strings and path parameters, indicating the abuse of application layer protocols to carry out the attack.