First published: Wed May 29 2024(Updated: )
In JetBrains TeamCity before 2022.04.7, 2022.10.6, 2023.05.6, 2023.11.5 improper access control in Pull Requests and Commit status publisher build features was possible
Credit: cve@jetbrains.com
Affected Software | Affected Version | How to fix |
---|---|---|
JetBrains TeamCity | <2022.04.7 | |
JetBrains TeamCity | >=2022.10<2022.10.6 | |
JetBrains TeamCity | >=2023.05<2023.05.6 | |
JetBrains TeamCity | >=2023.11<2023.11.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36364 is classified as a medium severity vulnerability due to improper access control.
To mitigate CVE-2024-36364, upgrade JetBrains TeamCity to version 2022.04.7, 2022.10.6, 2023.05.6, or 2023.11.5 or later.
CVE-2024-36364 affects JetBrains TeamCity versions prior to 2022.04.7, 2022.10.6, 2023.05.6, and 2023.11.5.
CVE-2024-36364 is an improper access control vulnerability related to Pull Requests and Commit status publisher build features.
Users and organizations utilizing impacted versions of JetBrains TeamCity may be affected by CVE-2024-36364.