CVE-2023-42793

In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible

Basic Information

CVE State
PUBLISHED
Reserved Date
September 14, 2023
Published Date
September 19, 2023
Last Updated
February 04, 2025
Vendor
JetBrains
Product
TeamCity
Description
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2023-10-04 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2024-04-21 13:52:28 UTC) Source
Used in Malware
Yes (added 2023-10-04 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2023-10-04 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

jetbrains_teamcity_rce_cve_2023_42793

Type: metasploit • Created: Unknown

Metasploit module for CVE-2023-42793

B4l3rI0n/CVE-2023-42793

Type: github • Created: 2024-04-24 16:33:20 UTC • Stars: 7

JetBrains TeamCity 2023.05.3 - Remote Code Execution (RCE), CVE-2023-42793

hotplugin0x01/CVE-2023-42793

Type: github • Created: 2024-04-21 13:52:28 UTC • Stars: 2

JetBrains TeamCity Unauthenticated Remote Code Execution - Python3 Implementation

Zenmovie/CVE-2023-42793

Type: github • Created: 2023-10-05 18:12:25 UTC • Stars: 6

PoC of CVE-2023-42793

H454NSec/CVE-2023-42793

Type: github • Created: 2023-09-29 06:43:35 UTC • Stars: 43

JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit