First published: Fri Feb 25 2022(Updated: )
JetBrains TeamCity before 2021.2 was vulnerable to a Time-of-check/Time-of-use (TOCTOU) race-condition attack in agent registration via XML-RPC.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
JetBrains TeamCity | <2021.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24335 has a medium severity rating due to the potential for exploitation through a race condition.
To fix CVE-2022-24335, upgrade JetBrains TeamCity to version 2021.2.1 or later.
CVE-2022-24335 affects JetBrains TeamCity versions prior to 2021.2.1.
CVE-2022-24335 is classified as a Time-of-check/Time-of-use (TOCTOU) race condition vulnerability.
CVE-2022-24335 can be exploited through unauthorized agent registration due to race condition timing issues.