CVE-2022-24339
https://notcve.org/view.php?id=CVE-2022-24339
JetBrains TeamCity before 2021.2.1 was vulnerable to stored XSS. JetBrains TeamCity versiones anteriores a 2021.2.1 era vulnerable a un ataque de tipo XSS almacenado. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-24338
https://notcve.org/view.php?id=CVE-2022-24338
JetBrains TeamCity before 2021.2.1 was vulnerable to reflected XSS. JetBrains TeamCity versiones anteriores a 2021.2.1 era vulnerable a un ataque de tipo XSS reflejado. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-24337
https://notcve.org/view.php?id=CVE-2022-24337
In JetBrains TeamCity before 2021.2, health items of pull requests were shown to users who lacked appropriate permissions. En JetBrains TeamCity versiones anteriores a 2021.2, los elementos de salud de las peticiones de extracción eran mostrados a usuarios que carecían de los permisos apropiados. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 • CWE-276: Incorrect Default Permissions •
CVE-2022-24336
https://notcve.org/view.php?id=CVE-2022-24336
In JetBrains TeamCity before 2021.2.1, an unauthenticated attacker can cancel running builds via an XML-RPC request to the TeamCity server. En JetBrains TeamCity versiones anteriores a 2021.2.1, un atacante no autenticado puede cancelar construcciones en ejecución por medio de una petición XML-RPC al servidor de TeamCity. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 •
CVE-2022-24335
https://notcve.org/view.php?id=CVE-2022-24335
JetBrains TeamCity before 2021.2 was vulnerable to a Time-of-check/Time-of-use (TOCTOU) race-condition attack in agent registration via XML-RPC. JetBrains TeamCity versiones anteriores a 2021.2, era vulnerable a un ataque de condición de carrera de tiempo de comprobación/tiempo de uso (TOCTOU) en el registro de agentes por medio de XML-RPC. • https://blog.jetbrains.com https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •