TeamCity On-Premises 2023.05 Help

TeamCity 2023.05.6 Release Notes

Build: 129475

30 May 2024

Bug

TW-87765 — Subproject administrator cannot view NuGet feed and Artifact storage settings of a parent project

TW-87750 — The user with the Project Administrator role can't see the NuGet feed

TW-86261 — Regression: java.lang.InstantiationException: bean bean not found within scope; while processing request

TW-83663 — REST API - builds with "failedToStart:true" don't show up in response when combined with "property:(name:XYZ)"

TW-85625 — Perforce: possible race condition when collecting changes

TW-85328 — Perforce: build continues executing even if there are problems during checkout

TW-82564 — TeamCity REST API may occasionally provide artifacts of another build of the same build configuration

TW-84339 — Cannot open artifacts folder with square brackets from the UI

TW-84065 — Enable testOnBorrow and validation query for PostgreSQL connections by default

TW-83312 — Builds fail on free disk space stage

TW-83829 — Python executable could be found but not reported to agent parameter

TW-83698 — perforce shelve trigger firing for an already ran build

Performance Problem

TW-85640 — Exclude testOccurrence(count) from request on a build overview page

TW-85482 — Too slow revision computation (lots of time spent in CheckoutRulesRevWalk.collectUninterestingCommits)

TW-84618 — Inefficient checking for changes in Perforce (nested doGetPath2LatestRevision calls)

Security

25 security issues were fixed. To protect customers who have not yet updated their servers, we typically withhold details about these fixes. Instead, we encourage you to review our Security Bulletin a few days after each bugfix release for more information.

In our effort to enhance transparency and due to potential delays in publishing new security bulletins (stemming from the simultaneous release of the 2022.04.6, 2022.10.5, 2023.05.5, 2023.11.5, and 2024.03.2 bug-fix updates), we have decided to provide a summary of both new and backported fixes.

Backported Fixes

These issues were resolved in newer major TeamCity versions and backported to this bug-fix update. You can find more info about them in our Security Bulletin.

  • Path traversal allowed reading data within JAR archives. Reported by Sndav Bai and Crispr Xiang from TianShu Dubhe Team (TW-86017)

  • Stored XSS during restore from backup was possible (TW-82309)

  • Authentication bypass allowing to perform admin actions was possible. Reported by Rapid7 team (TW-86500)

  • Authentication bypass leading to RCE was possible. Reported by Sndav Bai and Crispr Xiang from TianShu Dubhe Team (TW-86005)

  • Path traversal allowing to perform limited admin actions was possible. Reported by Rapid7 team (TW-86502)

  • XXE was possible in the Maven build steps detector (TW-86300)

  • Authenticated users without administrative permissions could register other users when self-registration was disabled (TW-87046)

  • Server administrators could remove arbitrary files from the server by installing tools (TW-86039)

  • Presigned URL generation requests in S3 Artifact Storage plugin were authorized improperly (TW-85562)

  • XSS was possible via Agent Distribution settings (TW-86535)

  • Open redirect was possible on the login page (TW-87062)

  • Limited directory traversal was possible in the Kotlin DSL documentation (TW-85585)

  • Stored XSS while viewing the build log was possible (TW-81777)

Recently Resolved Issues

Fixes for the following security issues are not immediately available in our Security Bulletin: newly discovered and fixed problems, issues from upstream libraries outside the TeamCity codebase, specific cases of previously reported vulnerabilities, and others.

You can expect details on most of these issues to be published in our Security Bulletin a few days after the official release.

  • Path traversal allowing to read files from server was possible

  • TeamCity server could be accessed without authorization during specific brief moments of its lifecycle

  • Several Stored XSS in code inspection reports

  • Improper access control in Pull Requests and Commit status publisher build features

  • Stored XSS in Commit status publisher was possible

  • A third-party agent could impersonate a cloud agent

  • An XSS could be executed via certain report grouping and filtering operations

  • Stored XSS via third-party reports was possible

  • Reflected XSS via OAuth provider configuration was possible

  • Stored XSS via issue tracker integration was possible

  • Stored XSS via OAuth connection settings was possible

  • Reflected XSS on the subscriptions page was possible

Last modified: 30 May 2024