A important safety vulnerability within the JetBrains TeamCity steady integration and steady deployment (CI/CD) software program could possibly be exploited by unauthenticated attackers to realize distant code execution on affected methods.
“Attackers may leverage this entry to steal supply code, service secrets and techniques, and personal keys, take management over hooked up construct brokers, and poison construct artifacts,” Sonar safety researcher Stefan Schiller said in a report final week.
Profitable exploitation of the bug may additionally allow menace actors to entry the construct pipelines and inject arbitrary code, resulting in an integrity breach and provide chain compromises.
Extra particulars of the bug have been withheld as a result of the truth that it is trivial to use, with Sonar noting that it is prone to be exploited within the wild by menace actors.
JetBrains, in an independent advisory, has really useful customers to improve as quickly as doable. It has additionally launched a safety patch plugin for TeamCity variations 8.0 and above to particularly deal with the flaw.
The disclosure comes as two high-severity flaws have been disclosed within the Atos Unify OpenScape merchandise that permit a low-privileged attacker to execute arbitrary working methods instructions as root consumer (CVE-2023-36618) in addition to an unauthenticated attacker to entry and execute varied configuration scripts (CVE-2023-36619).
Fight AI with AI — Battling Cyber Threats with Next-Gen AI Tools
Able to deal with new AI-driven cybersecurity challenges? Be part of our insightful webinar with Zscaler to handle the rising menace of generative AI in cybersecurity.
The issues had been patched by Atos in July 2023.
Over the previous few weeks, Sonar has additionally printed particulars about important cross-site scripting (XSS) vulnerabilities affecting encrypted electronic mail options, together with Proton Mail, Skiff, and Tutanota, that would have been weaponized to steal emails and impersonate victims.