Crash that can be triggered by users when Websockets are in use (a listen block with listen::options::websocket). This was assigned CVE-2023-50784.
In 6.1.3, Websockets were not working with Chrome and possibly other browsers.
Crash that can be triggered by users when Websockets are in use (a listen block with listen::options::websocket). This was assigned CVE-2023-50784.
In 6.1.3, Websockets were not working with Chrome and possibly other browsers.
Crash that can be triggered by users when Websockets are in use (a listen block with listen::options::websocket). This was assigned CVE-2023-50784.
In 6.1.3, Websockets were not working with Chrome and possibly other browsers.
Crash that can be triggered by users when Websockets are in use (a listen block with listen::options::websocket). This was assigned CVE-2023-50784.
In 6.1.3, Websockets were not working with Chrome and possibly other browsers.
Multiple vulnerabilities were discovered in FreeImage, a support library
for graphics image formats, which could result in the execution of
arbitrary code if malformed image files are processed.
The initial fix for CVE-2023-6377 as applied in DSA 5576-1 did not fully
fix the vulnerability. Updated packages correcting this issue including
the upstream merged commit are now available.
What is the Attack?
Multiple cyberthreat actors seen exploiting the authentication bypass flaw in JetBrains TeamCity that could lead to remote code execution. If compromised, access to a TeamCity server would provide malicious actors with access to the software developer’s source code, signing certificates, and the ability to manipulate software compilation and deployment processes. The malicious actors could further use to conduct supply chain operations.
What is the Vendor Solution?
JetBrains released patch on September 18, 2023 to fix the affected TeamCity software on version 2023.05.4, which can be found here: https://www.jetbrains.com/teamcity/download/other.html.
What FortiGuard Coverage is available?
FortiGuard Labs has an IPS signature “JetBrains.TeamCity.CVE-2023-42793.Authentication.Bypass” (with default action is set to “block”) in place and has released Antivirus signatures for the known and related malware to the campaigns targeting the vulnerability (CVE-2023-42793).