<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Teamcity — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/teamcity/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/teamcity/feed.xml" rel="self" type="application/rss+xml"/><item><title>JetBrains TeamCity Authentication Bypass and Path Traversal Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-04-jetbrains-teamcity-vulns/</link><pubDate>Wed, 22 Apr 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jetbrains-teamcity-vulns/</guid><description>Unpatched JetBrains TeamCity servers are being actively exploited via an authentication bypass (CVE-2024-27198) and path traversal vulnerability (CVE-2024-27199), allowing attackers to perform administrative actions and potentially conduct supply-chain attacks.</description><content:encoded><![CDATA[<p>JetBrains TeamCity, a CI/CD software platform, is vulnerable to CVE-2024-27198, an authentication bypass, and CVE-2024-27199, a path traversal vulnerability. These flaws affect TeamCity versions prior to 2023.11.4. Initially, there was no observed active exploitation. However, by March 7, 2024, widespread exploitation was detected following the public availability of proof-of-concept code. Attackers are actively exploiting these vulnerabilities to create new user accounts on publicly exposed, unpatched TeamCity instances. A substantial number of compromised servers are utilized as production machines for software building and deployment. These attacks have the potential to lead to supply-chain compromises by exposing sensitive information. CISA added CVE-2024-27199 to its Known Exploited Vulnerabilities catalog on April 20, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to a vulnerable TeamCity server, exploiting CVE-2024-27198 to bypass authentication.</li>
<li>Once authenticated (or bypassing authentication), the attacker leverages CVE-2024-27199, a path traversal vulnerability, to access sensitive files and directories on the server.</li>
<li>The attacker reads configuration files containing credentials for other systems and services.</li>
<li>The attacker creates new administrative user accounts on the TeamCity server to ensure persistent access.</li>
<li>The attacker modifies build configurations to inject malicious code into software builds.</li>
<li>The attacker compromises the software supply chain by injecting malicious code into build artifacts.</li>
<li>The attacker uses stolen credentials to access deployment environments and deploy compromised builds.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to perform administrative actions on affected TeamCity servers, leading to a compromise of confidentiality, integrity, and availability of data and infrastructure. The compromise of TeamCity servers used for software building and deployment can result in supply-chain attacks, as these servers often contain sensitive information, such as credentials for deployment environments. A substantial portion of compromised TeamCity servers are utilized as production machines for software building and deployment processes, increasing the scope and impact of potential supply chain attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch all JetBrains TeamCity servers to version 2023.11.4 or later to remediate CVE-2024-27198 and CVE-2024-27199 (Reference: <a href="https://www.jetbrains.com/privacy-security/issues-fixed/)">https://www.jetbrains.com/privacy-security/issues-fixed/)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect TeamCity Authentication Bypass Attempt&rdquo; to your SIEM to detect exploitation attempts of CVE-2024-27198.</li>
<li>Enable web server logging and increase monitoring to detect suspicious activity related to path traversal attempts indicative of CVE-2024-27199 exploitation.</li>
<li>Monitor for the creation of new user accounts within TeamCity, especially administrative accounts, which could indicate successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>teamcity</category><category>vulnerability</category><category>authentication bypass</category><category>path traversal</category><category>supply-chain</category></item><item><title>Suspicious Child Processes Spawned by JetBrains TeamCity</title><link>https://feed.craftedsignal.io/briefs/2024-05-jetbrains-teamcity-suspicious-child-process/</link><pubDate>Wed, 15 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-jetbrains-teamcity-suspicious-child-process/</guid><description>Detection of suspicious processes spawned by JetBrains TeamCity indicates potential exploitation of remote code execution vulnerabilities, with attackers using command interpreters and system binaries for malicious purposes.</description><content:encoded><![CDATA[<p>JetBrains TeamCity is a continuous integration and deployment server, making it a high-value target for attackers. Exploitation of TeamCity vulnerabilities can lead to remote code execution, enabling adversaries to compromise the software development pipeline. This activity is detected by monitoring for suspicious child processes initiated by the TeamCity Java executable, focusing on executables like <code>cmd.exe</code>, <code>powershell.exe</code>, and <code>msiexec.exe</code>. The detection logic excludes legitimate operations to reduce false positives. This activity can lead to complete compromise of the build environment, allowing attackers to inject malicious code into software builds.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker exploits a vulnerability (e.g., CVE-2023-42793) in the TeamCity server to gain initial access.</li>
<li><strong>Code Execution:</strong> The attacker leverages the vulnerability to execute arbitrary code on the TeamCity server.</li>
<li><strong>Process Spawning:</strong> The attacker spawns a command interpreter, such as <code>cmd.exe</code> or <code>powershell.exe</code>, from the TeamCity Java process (<code>java.exe</code>).</li>
<li><strong>Discovery:</strong> The attacker uses discovery commands via the spawned shell to enumerate users, network configuration, and running processes using tools like <code>whoami.exe</code>, <code>ipconfig.exe</code>, and <code>tasklist.exe</code>.</li>
<li><strong>Defense Evasion:</strong> The attacker leverages system binary proxy execution using tools like <code>mshta.exe</code> or <code>regsvr32.exe</code> to evade detection.</li>
<li><strong>Persistence:</strong> While not explicitly mentioned, the attacker could establish persistence by creating scheduled tasks or modifying registry keys via spawned processes.</li>
<li><strong>Lateral Movement:</strong> The attacker uses discovered credentials to move laterally to other systems within the network.</li>
<li><strong>Impact:</strong> The attacker injects malicious code into software builds, compromises sensitive data, or deploys ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of JetBrains TeamCity can lead to a full compromise of the software development lifecycle, resulting in supply chain attacks. Attackers can inject malicious code into software builds, leading to widespread distribution of compromised software. While specific victim counts are unavailable, this type of attack has the potential to affect numerous organizations relying on the compromised software. The Trend Micro research indicates that TeamCity vulnerability exploits can lead to Jasmin ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Suspicious JetBrains TeamCity Child Process&rdquo; rule to your SIEM to detect potential exploitation attempts.</li>
<li>Enable Sysmon process creation logging to capture process execution events, which are essential for triggering the detection rule.</li>
<li>Review and patch any known vulnerabilities in JetBrains TeamCity, focusing on remote code execution flaws as described in the referenced Trend Micro report.</li>
<li>Implement network segmentation to limit the impact of a compromised TeamCity server and prevent lateral movement.</li>
<li>Continuously monitor TeamCity server logs for any unusual activity or unauthorized access attempts.</li>
<li>Tune the &ldquo;Suspicious JetBrains TeamCity Child Process&rdquo; rule by creating exceptions for legitimate build scripts that invoke command-line utilities to reduce false positives, as mentioned in the rule&rsquo;s documentation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>teamcity</category><category>supply-chain</category><category>initial-access</category></item></channel></rss>