{"vulnerability": "cve-2024-56348", "sightings": [{"uuid": "e07b0593-4cfb-4673-b68e-aedd4b8a2d93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56348", "type": "seen", "source": "AIL", "content": "", "creation_timestamp": "2024-12-23T14:00:20.072000Z"}, {"uuid": "eb484e55-98b6-4826-ad9f-0e272a01e63c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56348", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldqoiyzizh2s", "content": "", "creation_timestamp": "2024-12-20T15:15:29.565450Z"}, {"uuid": "abb39055-851f-4fb3-bf12-770efa6a186a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56348", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/76736", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #RCE #Remote\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a cve-2024-56348\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Msakhana68\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a FreeMarker\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-03-23 03:23:01\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nDemonstrate an authentication bypass and remote code execution exploit targeting JetBrains TeamCity versions before 2024.12 via REST API abuse.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-03-23T04:00:39.000000Z"}, {"uuid": "36939265-7f0d-45c4-8af4-6c5b9fa7c6b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56348", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113685576561934015", "content": "", "creation_timestamp": "2024-12-20T14:17:12.670362Z"}, {"uuid": "4c0d8aea-623e-4337-b277-3c82488a15ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56348", "type": "seen", "source": "https://t.me/cvedetector/13443", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56348 - JetBrains TeamCity Agent Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56348 \nPublished : Dec. 20, 2024, 3:15 p.m. | 21\u00a0minutes ago \nDescription : In JetBrains TeamCity before 2024.12 improper access control allowed viewing details of unauthorized agents \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-20T16:45:01.000000Z"}]}