{"id":515422,"date":"2024-04-24T10:11:53","date_gmt":"2024-04-24T09:11:53","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=515422"},"modified":"2024-04-25T13:20:10","modified_gmt":"2024-04-25T12:20:10","slug":"alerte-securite-jetbrains-teamcity-reponse-produits-stormshield","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/","title":{"rendered":"Alerte de s\u00e9curit\u00e9 JetBrains TeamCity : la r\u00e9ponse des produits Stormshield"},"content":{"rendered":"<p><strong>Quatre vuln\u00e9rabilit\u00e9s impactent l\u2019outil de CI\/CD TeamCity de JetBrains, permettant de r\u00e9aliser un bypass d\u2019authentification. Parmi elles, deux vuln\u00e9rabilit\u00e9s critiques, aux c\u00f4t\u00e9s d'une haute et d'une moyenne. Identifi\u00e9es par les r\u00e9f\u00e9rences CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 et CVE-2024-24942, elles obtiennent respectivement un score CVSS v3.1 de 9,8, 9,8, 7,3 et 5,3. L\u2019\u00e9quipe Stormshield Customer Security Lab d\u00e9taille les protections fournies par Stormshield.<\/strong><\/p>\n<p>Tous les serveurs JetBrains TeamCity en versions inf\u00e9rieures \u00e0 2023.11.4 sont vuln\u00e9rables aux CVE-2024-27198 et CVE-2024-27199. Tous les serveurs en versions inf\u00e9rieures \u00e0 2023.11.3 sont vuln\u00e9rables aux CVE-2024-23917 et CVE-2024-24942. L\u2019exploitation s\u2019effectue via l\u2019interface web de l\u2019applicatif.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9tails techniques des vuln\u00e9rabilit\u00e9s JetBrains<\/h2>\n<h3>CVE-2024-23917<\/h3>\n<p>Cette premi\u00e8re vuln\u00e9rabilit\u00e9 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23917\" target=\"_blank\" rel=\"noopener\">CVE-2024-23917<\/a> permet de contourner l\u2019authentification du serveur, sans limitation. Elle r\u00e9side dans une erreur de conception de la fonction d\u00e9terminant si la requ\u00eate doit \u00eatre trait\u00e9e par le syst\u00e8me d\u2019authentification. Si la requ\u00eate finit par <em><code>\u00ab\u00a0.jsp\u00a0\u00bb<\/code><\/em> ou <em><code>\u00ab\u00a0.jspf\u00a0\u00bb<\/code><\/em> et contient le param\u00e8tre GET <em><code>\u00ab\u00a0jsp_precompile\u00a0\u00bb<\/code><\/em> non nul, l\u2019authentification ne sera pas v\u00e9rifi\u00e9e. Il est possible d\u2019abuser de ce comportement, en injectant apr\u00e8s n\u2019importe quel chemin <em><code>\u00ab\u00a0;nomdefichierbidon.jsp?jsp_precompile=1\u00a0\u00bb<\/code><\/em>. Par exemple\u00a0:\u00a0<em><code>\u00ab\u00a0\/app\/rest\/users\/id:1\/tokens\/name;randomname.jsp?jsp_precompile=1\u00a0\u00bb<\/code><\/em><\/p>\n<h3>CVE-2024-27198<\/h3>\n<p>Cette deuxi\u00e8me vuln\u00e9rabilit\u00e9 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-27198\" target=\"_blank\" rel=\"noopener\">CVE-2024-27198<\/a> permet \u00e9galement de contourner l\u2019authentification du serveur. Elle r\u00e9side \u00e9galement dans l\u2019usage d\u2019un <em><code>\u00ab\u00a0;\u00a0\u00bb<\/code><\/em> pour abuser un filtre, qui teste si le contenu du param\u00e8tre GET <em><code>\u00ab\u00a0jsp\u00a0\u00bb<\/code><\/em> finit bien par <em><code>\u00ab\u00a0.jsp\u00a0\u00bb<\/code><\/em>. En utilisant un chemin qui retourne une erreur 404 (par exemple <em><code>\u00ab\u00a0\/abc\u00a0\u00bb<\/code><\/em>) et en y ajoutant le param\u00e8tre GET <em><code>\u00ab\u00a0jsp\u00a0\u00bb<\/code><\/em> contenant le chemin que l\u2019on souhaite obtenir, suivi de <em><code>\u00ab\u00a0;.jsp\u00a0\u00bb<\/code><\/em>, on peut alors acc\u00e9der \u00e0 tout chemin ne contenant pas <em><code>\u00ab\u00a0admin\/\u00a0\u00bb<\/code><\/em> sans authentification. Par exemple\u00a0: <em><code>\u00ab\u00a0\/abc?jsp=\/app\/rest\/users\/id:1\/tokens\/nameToken;.jsp\u00a0\u00bb<\/code><\/em><\/p>\n<h3>CVE-2024-27199<\/h3>\n<p>Cette troisi\u00e8me vuln\u00e9rabilit\u00e9 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-27199\" target=\"_blank\" rel=\"noopener\">CVE-2024-27199<\/a> permet de contourner l\u2019authentification du serveur via une travers\u00e9e de chemin. Dans certains chemins non authentifi\u00e9s, il est possible d\u2019injecter un <em><code>\u00ab\u00a0..\/\u00a0\u00bb<\/code><\/em> et certains chemins acc\u00e9d\u00e9s seront alors sans authentification. Par exemple\u00a0: <em><code>\u00ab\u00a0\/res\/..\/admin\/diagnostic.jsp\u00a0\u00bb<\/code><\/em><\/p>\n<h3>CVE-2024-24942<\/h3>\n<p>Cette quatri\u00e8me vuln\u00e9rabilit\u00e9 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-24942\" target=\"_blank\" rel=\"noopener\">CVE-2024-24942<\/a> est \u00e9galement une travers\u00e9e de chemin r\u00e9sidant dans <em><code>\u00ab\u00a0\/app\/rest\/swagger*\u00a0\u00bb<\/code><\/em>. Le chemin suivant ce <em><code>\u00ab\u00a0swagger*\u00a0\u00bb<\/code><\/em> est pass\u00e9 tel quel \u00e0 une fonction lisant le contenu du fichier indiqu\u00e9. Il est ainsi possible d\u2019effectuer une travers\u00e9e de dossier via <em><code>\u00ab\u00a0..\/\u00a0\u00bb<\/code><\/em> et donc de lire certains fichiers. Cette vuln\u00e9rabilit\u00e9 est limit\u00e9e \u00e0 certains types de fichiers, ce qui explique son faible score CVSS. Par exemple\u00a0:\u00a0<em><code>\u00ab\u00a0\/app\/rest\/swaggerui;\/..\/..\/web.xml\u00a0\u00bb<\/code><\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>La mod\u00e9lisation de l'attaque avec MITRE ATT&amp;CK<\/h2>\n<h3>MITRE ATT&amp;CK<\/h3>\n<ul>\n<li>T1210 (Exploitation of Remote Services)<\/li>\n<\/ul>\n<h3>CWE<\/h3>\n<ul>\n<li>CVE-2024-23917\u00a0: CWE-288 \u2013 Authentication Bypass Using an Alternate Path or Channel<\/li>\n<li>CVE-2024-27198\u00a0: CWE-288 \u2013 Authentication Bypass Using an Alternate Path or Channel<\/li>\n<li>CVE-2024-27199\u00a0: CWE-22 \u2013 Improper Limitation of a Pathname to a Restricted Directory<\/li>\n<li>CVE-2024-24943\u00a0: CWE-23 \u2013 Relative Path Traversal<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Les moyens de protections avec Stormshield Network Security face aux vuln\u00e9rabilit\u00e9s JetBrains<\/h2>\n<h3>Protection face \u00e0 la CVE-2024-23917<\/h3>\n<ul>\n<li>Signature <strong>http:url:decoded.427<\/strong> - Exploitation d'un contournement de l'authentification dans JetBrains TeamCity (CVE-2024-23917)<\/li>\n<\/ul>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-233125\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-3.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Protection face \u00e0 la CVE-2024-27198<\/h3>\n<ul>\n<li>Signature <strong>http:url:decoded.425<\/strong> - Exploitation d'un contournement de l'authentification dans JetBrains TeamCity (CVE-2024-27198)<\/li>\n<\/ul>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-232004 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-2.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Protection face aux CVE-2024-27199 &amp; CVE-2024-24942<\/h3>\n<ul>\n<li>Signature <strong>http:80<\/strong> \u2013 Chemin avec r\u00e9f\u00e9rence sup\u00e9rieure<\/li>\n<\/ul>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Recommandations face aux vuln\u00e9rabilit\u00e9s JetBrains<\/h3>\n<p>Il est recommand\u00e9 de mettre \u00e0 jour les serveurs JetBrains TeamCity vers la derni\u00e8re version en date. JetBrains fournit la liste des vuln\u00e9rabilit\u00e9s corrig\u00e9es dans ses versions ici : <a href=\"https:\/\/www.jetbrains.com\/privacy-security\/issues-fixed\/?product=TeamCity\" target=\"_blank\" rel=\"noopener\">jetbrains.com\/privacy-security\/issues-fixed\/?product=TeamCity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quatre vuln\u00e9rabilit\u00e9s impactent l\u2019outil de CI\/CD TeamCity de JetBrains, permettant de r\u00e9aliser un bypass d\u2019authentification. Parmi elles, deux vuln\u00e9rabilit\u00e9s critiques, aux c\u00f4t\u00e9s d&rsquo;une haute et d&rsquo;une moyenne. Identifi\u00e9es par les r\u00e9f\u00e9rences CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 et CVE-2024-24942, elles obtiennent respectivement un score CVSS v3.1 de 9,8,&#8230;<\/p>\n","protected":false},"author":83,"featured_media":190179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1503],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[],"class_list":["post-515422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alertes","tag-la-cybersecurite-par-stormshield"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Multiples vuln\u00e9rabilit\u00e9s sur l&#039;outil CI\/CD TeamCity - JetBrains<\/title>\n<meta name=\"description\" content=\"Alerte de s\u00e9curit\u00e9 JetBrains et moyens de protection face aux CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 et CVE-2024-24942.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multiples vuln\u00e9rabilit\u00e9s sur l&#039;outil CI\/CD TeamCity - JetBrains\" \/>\n<meta property=\"og:description\" content=\"Alerte de s\u00e9curit\u00e9 JetBrains et moyens de protection face aux CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 et CVE-2024-24942.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-24T09:11:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-25T12:20:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stormshield Customer Security Lab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stormshield Customer Security Lab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/\"},\"author\":{\"name\":\"Stormshield Customer Security Lab\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249\"},\"headline\":\"Alerte de s\u00e9curit\u00e9 JetBrains TeamCity : la r\u00e9ponse des produits Stormshield\",\"datePublished\":\"2024-04-24T09:11:53+00:00\",\"dateModified\":\"2024-04-25T12:20:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/\"},\"wordCount\":671,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Alertes\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/\",\"url\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/\",\"name\":\"Multiples vuln\u00e9rabilit\u00e9s sur l'outil CI\/CD TeamCity - JetBrains\",\"isPartOf\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\",\"datePublished\":\"2024-04-24T09:11:53+00:00\",\"dateModified\":\"2024-04-25T12:20:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249\"},\"description\":\"Alerte de s\u00e9curit\u00e9 JetBrains et moyens de protection face aux CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 et CVE-2024-24942.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#primaryimage\",\"url\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\",\"contentUrl\":\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\",\"width\":2560,\"height\":1422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stormshield.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alerte de s\u00e9curit\u00e9 JetBrains TeamCity : la r\u00e9ponse des produits Stormshield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#website\",\"url\":\"https:\/\/www.stormshield.com\/fr\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249\",\"name\":\"Stormshield Customer Security Lab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"caption\":\"Stormshield Customer Security Lab\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Multiples vuln\u00e9rabilit\u00e9s sur l'outil CI\/CD TeamCity - JetBrains","description":"Alerte de s\u00e9curit\u00e9 JetBrains et moyens de protection face aux CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 et CVE-2024-24942.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/","og_locale":"fr_FR","og_type":"article","og_title":"Multiples vuln\u00e9rabilit\u00e9s sur l'outil CI\/CD TeamCity - JetBrains","og_description":"Alerte de s\u00e9curit\u00e9 JetBrains et moyens de protection face aux CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 et CVE-2024-24942.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/","og_site_name":"Stormshield","article_published_time":"2024-04-24T09:11:53+00:00","article_modified_time":"2024-04-25T12:20:10+00:00","og_image":[{"width":2560,"height":1422,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","type":"image\/jpeg"}],"author":"Stormshield Customer Security Lab","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Stormshield Customer Security Lab","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/"},"author":{"name":"Stormshield Customer Security Lab","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"headline":"Alerte de s\u00e9curit\u00e9 JetBrains TeamCity : la r\u00e9ponse des produits Stormshield","datePublished":"2024-04-24T09:11:53+00:00","dateModified":"2024-04-25T12:20:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/"},"wordCount":671,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Alertes"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/","name":"Multiples vuln\u00e9rabilit\u00e9s sur l'outil CI\/CD TeamCity - JetBrains","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","datePublished":"2024-04-24T09:11:53+00:00","dateModified":"2024-04-25T12:20:10+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"description":"Alerte de s\u00e9curit\u00e9 JetBrains et moyens de protection face aux CVE-2024-23917, CVE-2024-27198, CVE-2024-27199 et CVE-2024-24942.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","width":2560,"height":1422},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-jetbrains-teamcity-reponse-produits-stormshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Alerte de s\u00e9curit\u00e9 JetBrains TeamCity : la r\u00e9ponse des produits Stormshield"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249","name":"Stormshield Customer Security Lab","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","caption":"Stormshield Customer Security Lab"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/515422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=515422"}],"version-history":[{"count":6,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/515422\/revisions"}],"predecessor-version":[{"id":515467,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/515422\/revisions\/515467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/190179"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=515422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=515422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=515422"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=515422"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=515422"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=515422"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=515422"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=515422"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=515422"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=515422"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=515422"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=515422"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=515422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}