Security

Patches

Rapid7 throws JetBrains under the bus for 'uncoordinated vulnerability disclosure'

Exploits began within hours of the original disclosure, so patch now


Updated Security shop Rapid7 is criticizing JetBrains for flouting its policy against silent patching regarding fixes for two fresh vulnerabilities in the TeamCity CI/CD server.

Rapid7 says it reported the two TeamCity vulnerabilities in mid-February, claiming JetBrains soon after suggested releasing patches for the flaws before publicly disclosing them.

Such a move is typically seen as a no-no by the infosec community, which favors transparency, but there's apparently a time and a place for these things.

According to the cybersecurity company, it replied by saying it wouldn't agree to swift disclosure, and pointed JetBrains to its policy against silently patching vulnerabilities, which stipulates that if companies violate that policy, Rapid7 will itself release the full details of the vulnerability, including enough information to allow people to develop exploits, within 24 hours.

Rapid7 claims that after more than a week of radio silence from JetBrains on the coordinated disclosure matter, Rapid7 spotted fresh patches for CVE-2024-27198 and CVE-2024-27199 on Monday, without a published security advisory and without telling the researchers.

Following what sounds like a sternly worded email from Rapid7, JetBrains released a blog detailing the vulnerabilities, but the security researchers say it continued to ignore inquiries about why it violated coordinated vulnerability disclosure norms.

The details can all be found at the bottom of Rapid7's security advisory.

A glass-half-full onlooker may consider JetBrains' behavior and consider how silently patching the vulnerabilities could have been positive. It's well-known that alerting attackers to vulnerabilities before organizations can apply patches often leads to exploits at a scale that leaves a trail of victims behind. 

JetBrains may just have wanted to avoid this scenario, but as it says in its own security advisory, it was well aware that Rapid7 would publish within 24 hours, so this optimism doesn't hold up much to scrutiny.

Further, according to internet monitoring biz Shadowserver, exploits of the vulnerabilities are already well underway, starting at 2200 UTC the same day the vulnerabilities were disclosed.

Glass-half-empty types will think JetBrains sought to avoid negative press, especially given the other recent TeamCity issues, or that it was just being generally ignorant of the disclosure norms.

We sent some questions about this over to JetBrains but they didn't immediately respond.

While JetBrains prepares to tell its side of the story – see the update below – members of the infosec community have shamed the TeamCity vendor over the supposed uncoordinated disclosure with Rapid7.

"The Rapid7 blog on JetBrains TeamCity is savage – especially the disclosure timeline," said security researcher Ron Bowes on Mastodon. 

"I know from previously working on that team that we tried hard to be friendly and cooperative with vendors. The fact that Rapid7 calls them out on their behavior means it must have been bad."

Inside the TeamCity vulnerabilities

JetBrains said the two vulnerabilities, both discovered by Stephen Frewer, are "critical," although the National Vulnerability Database (NVD) has only assigned one with critical status.

It's worth noting that CVE-2024-27198 attracts a higher severity score because it could allow attackers to take full administrative control of a TeamCity server and achieve unauthenticated remote code execution.

Rapid7 says CVE-2024-27199 only allows for a "limited amount" of information disclosure and system modification. This includes an unauthenticated attacker being able to replace a server's HTTPS certificate with their own, thus opening up the possibility of man-in-the-middle (MITM) attacks.

Severity score aside, CVE-2024-27198 will certainly be the main cause of concern for CI/CD server admins given the potential for supply chain attacks to take hold.

JetBrains says these only affect the on-prem version of TeamCity. Cloud versions are already patched and weren't attacked prior to disclosure.

All on-prem versions through to 2023.11.3 are impacted by the flaws, JetBrains says. So the best route to protection is to either upgrade to version 2023.11.4 or install its security patch plugin. ®

Updated to add at 1619 UTC

"The most important part is the following," said a JetBrains spokesperson, referencing a blog post discussing its side of events.

"We never had any intention to release a fix silently without making the full details public. As a CVE Numbering Authority (CNA), we assigned CVE IDs for both issues a day after receiving the report.

"We suggested disclosing the details of the vulnerabilities in the same way we have followed in the past (with a time delay between releasing a fix and making a full disclosure), which allows our customers to upgrade their TeamCity instances.

"This suggestion was rejected by the Rapid7 team who published full details of the vulnerabilities (and how to exploit them) a few hours after we had released a fix to TeamCity customers."

Send us news
37 Comments

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence

OpenWrt orders router firmware updates after supply chain attack scare

A couple of bugs lead to a potentially bad time

Trump administration wants to go on cyber offensive against China

The US has never attacked Chinese critical infrastructure before, right?

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Perfect 10 directory traversal vuln hits SailPoint's IAM solution

20-year-old info disclosure class bug still pervades security software

US military grounds entire Osprey tiltrotor fleet over safety concerns

Boeing-Bell V-22 can't outfly its checkered past, it seems