Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2019-18363 CVE-2019-18367 CVE-2019-18366 |
CWE-ID | CWE-200 CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
TeamCity Web applications / CRM systems |
Vendor | JetBrains s.r.o. |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU22503
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-18363
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to improper input validation. A remote attacker can gain unauthorized access to the history of builds of a deleted build configuration.
MitigationInstall updates from vendor's website.
Vulnerable software versionsTeamCity: 3.1 - 2019.1.1
External linkshttp://blog.jetbrains.com/blog/2019/10/29/jetbrains-security-bulletin-q3-2019/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU22505
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-18367
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to improper permission checks. A remote authenticated user can perform a non-destructive operation without the corresponding permissions.
MitigationInstall updates from vendor's website.
Vulnerable software versionsTeamCity: 3.1 - 2019.1.1
External linkshttp://blog.jetbrains.com/blog/2019/10/29/jetbrains-security-bulletin-q3-2019/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU22504
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-18366
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to improper input validation. A remote authenticated user with the "View build runtime parameters and data" permission can gain unauthorized access to sensitive information on the system, such as secure values.
MitigationInstall updates from vendor's website.
Vulnerable software versionsTeamCity: 3.1 - 2019.1.1
External linkshttp://blog.jetbrains.com/blog/2019/10/29/jetbrains-security-bulletin-q3-2019/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.