diff --git a/templated/templateddetector/plugins/cve/2024/JetBrainsTeamCity_CVE_2024_27198.textproto b/templated/templateddetector/plugins/cve/2024/JetBrainsTeamCity_CVE_2024_27198.textproto new file mode 100644 index 000000000..a6aa6ae95 --- /dev/null +++ b/templated/templateddetector/plugins/cve/2024/JetBrainsTeamCity_CVE_2024_27198.textproto @@ -0,0 +1,148 @@ +# proto-file: proto/templated_plugin.proto +# proto-message: TemplatedPlugin + +############### +# PLUGIN INFO # +############### + +info: { + type: VULN_DETECTION + name: "JetBrainsTeamCity_CVE_2024_27198" + author: "frkngksl" + version: "1.0" +} + +finding: { + main_id: { + publisher: "GOOGLE" + value: "CVE-2024-27198" + } + severity: CRITICAL + title: "JetBrains TeamCity Authentication Bypass Vulnerability (CVE-2024-27198)" + description: "JetBrains TeamCity is a continuous integration and continuous deployment (CI/CD) server used by developers to automate building, testing, and releasing software. This vulnerability is a critical authentication-bypass vulnerability in JetBrains TeamCity that allows a remote, unauthenticated attacker to access endpoints meant to be protected and perform high-privilege actions." + recommendation: "Update the version to 2023.11.4 or later." + related_id: { + publisher: "CVE" + value: "CVE-2024-27198" + } +} + +config: {} + +########### +# ACTIONS # +########### + +actions: { + name: "fingerprint_teamcity" + http_request: { + method: GET + uri: "/login.html" + response: { + http_status: 200 + expect_all: { + conditions: [ + { body: {} contains: "