{"id":2127,"date":"2024-04-24T12:16:53","date_gmt":"2024-04-24T12:16:53","guid":{"rendered":"https:\/\/www.redflare-cyber.com\/?p=2127"},"modified":"2024-04-24T12:16:54","modified_gmt":"2024-04-24T12:16:54","slug":"cve-2024-27198-bypass-autenticazione-teamcity","status":"publish","type":"post","link":"https:\/\/www.redflare-cyber.com\/en\/cve-2024-27198-bypass-autenticazione-teamcity\/","title":{"rendered":"CVE-2024-27198: guida al Bypass dell&#8217;Autenticazione in TeamCity"},"content":{"rendered":"<p>Approfondiamo assieme l&#8217;exploit <strong>CVE-2024-27198<\/strong>, una significativa vulnerabilit\u00e0 di bypass dell&#8217;autenticazione nel software <strong>TeamCity<\/strong> &amp;nbsp<strong> <a href=\"https:\/\/www.jetbrains.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">JetBrains<\/a><\/strong>. Accompagnato da un video dimostrativo, questo articolo si pone l&#8217;obiettivo di conoscere le pi\u00f9 recenti vulnerabilit\u00e0 per proteggere efficacemente le proprie infrastrutture dalle minacce esterne.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cosa significa CVE-2024-27198?<\/h2>\n\n\n\n<p>Il codice alfanumerico CVE-2024-27198 si riferisce ad un difetto critico di sicurezza in TeamCity che permette agli utenti non autorizzati di bypassare i meccanismi di autenticazione. Questa <a href=\"https:\/\/www.redflare-cyber.com\/en\/vulnerability-assessment-avanzata-di-redflar\/\">vulnerabilit\u00e0<\/a> pu\u00f2 consentire agli attaccanti di accedere al server e eseguire operazioni potenzialmente malevole senza la necessit\u00e0 di credenziali valide.<\/p>\n\n\n\n<p>Ecco perch\u00e9 comprenderne i dettagli tecnici \u00e8 il primo passo per prevenirne lo sfruttamento.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-1024x512.png\" alt=\"Logo di TeamCity su sfondo di una schermata di autenticazione.\" class=\"wp-image-2129\" srcset=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-1024x512.png 1024w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-300x150.png 300w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-768x384.png 768w, https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Come Funziona il Bypass dell&#8217;Autenticazione in TeamCity?<\/h2>\n\n\n\n<p>Questa CVE (<em>Common Vulnerabilities and Exposures<\/em>) sfrutta un difetto nel processo di autenticazione del software in oggetto. Specificamente, il problema nasce da una gestione inadeguata della validazione delle sessioni utente durante certi tipi di richieste al server. Questo permette agli aggressori di imitare utenti legittimi senza dover effettivamente autenticarsi.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"nv-iframe-embed\"><iframe loading=\"lazy\" title=\"CVE-2024-27198: TeamCity Authentication Bypass\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/rKl9m3Eirl4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Prevenzione e Mitigazione<\/h2>\n\n\n\n<p>Proteggere i vostri sistemi da vulnerabilit\u00e0 come la CVE-2024-27198 richiede un approccio proattivo alla sicurezza, come:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Aggiornamenti e patch<\/strong>: Assicuratevi di installare tutte le patch di sicurezza rilasciate da JetBrains per TeamCity non appena diventano disponibili.<\/li>\n\n\n\n<li><strong>Monitoraggio e logging<\/strong>: Implementate una solida strategia di monitoraggio e logging per rilevare tentativi di accesso anomali o non autorizzati.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.redflare-cyber.com\/en\/formazione-sicurezza-informatica-redflare\/\">Formazione<\/a> e consapevolezza<\/strong>: Educare il personale tecnico o i propri collaboratori sulle tecniche di attacco comuni e le migliori pratiche di sicurezza pu\u00f2 ridurre significativamente il rischio di exploit.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-background\" style=\"background-color:#232323\">La conoscenza \u00e8 la nostra migliore difesa nel mondo della sicurezza informatica. Imparare da vulnerabilit\u00e0 come la CVE-2024-27198 \u00e8 fondamentale per proteggere le nostre risorse digitali. Attraverso la comprensione tecnica e la preparazione infatti, possiamo difenderci efficacemente contro la maggior parte degli attacchi informatici.<br><br>Possiamo tranquillamente dire che lo studio degli exploit pi\u00f9 recenti rappresenta forse una delle armi pi\u00f9 potenti che un professionista IT pu\u00f2 sfruttare per rafforzare la propria capacit\u00e0 di rispondere a simili minacce informatiche. Non sottovalutiamola!<\/p>","protected":false},"excerpt":{"rendered":"<p>Approfondiamo assieme l&#8217;exploit CVE-2024-27198, una significativa vulnerabilit\u00e0 di bypass dell&#8217;autenticazione nel software TeamCity di JetBrains. Accompagnato da un video dimostrativo, questo articolo si pone l&#8217;obiettivo di conoscere le pi\u00f9 recenti vulnerabilit\u00e0 per proteggere efficacemente le proprie infrastrutture dalle minacce esterne. Cosa significa CVE-2024-27198? Il codice alfanumerico CVE-2024-27198 si riferisce ad un difetto critico di sicurezza&hellip;&nbsp;<a href=\"https:\/\/www.redflare-cyber.com\/en\/cve-2024-27198-bypass-autenticazione-teamcity\/\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">CVE-2024-27198: guida al Bypass dell&#8217;Autenticazione in TeamCity<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":2131,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[68,43],"tags":[72,69,44,63,71,46,70],"class_list":["post-2127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cve","category-cybersecurity","tag-bypass","tag-cve","tag-cybersecurity","tag-hacking-tips","tag-jetbrains","tag-redflare","tag-teamcity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CVE-2024-27198: guida al Bypass dell&#039;Autenticazione in TeamCity &#8226; Redflare<\/title>\n<meta name=\"description\" content=\"CVE-2024-27198: mitigare il bypass dell&#039;autenticazione per proteggere il proprio ambiente TeamCity e rafforzare la sicurezza dei sistemi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.redflare-cyber.com\/en\/cve-2024-27198-bypass-autenticazione-teamcity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2024-27198: guida al Bypass dell&#039;Autenticazione in TeamCity &#8226; Redflare\" \/>\n<meta property=\"og:description\" content=\"CVE-2024-27198: mitigare il bypass dell&#039;autenticazione per proteggere il proprio ambiente TeamCity e rafforzare la sicurezza dei sistemi.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.redflare-cyber.com\/en\/cve-2024-27198-bypass-autenticazione-teamcity\/\" \/>\n<meta property=\"og:site_name\" content=\"Redflare\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-24T12:16:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-24T12:16:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-cover.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alessandro Targa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Targa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/\"},\"author\":{\"name\":\"Alessandro Targa\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/person\\\/4e308dfb8c13b67d37a14b5cffe8d1b8\"},\"headline\":\"CVE-2024-27198: guida al Bypass dell&#8217;Autenticazione in TeamCity\",\"datePublished\":\"2024-04-24T12:16:53+00:00\",\"dateModified\":\"2024-04-24T12:16:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/\"},\"wordCount\":349,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/17-teamcity-authentication-bypass-cover.png\",\"keywords\":[\"bypass\",\"CVE\",\"cybersecurity\",\"hacking tips\",\"JetBrains\",\"redflare\",\"TeamCity\"],\"articleSection\":[\"CVE\",\"Cybersecurity\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/\",\"name\":\"CVE-2024-27198: guida al Bypass dell'Autenticazione in TeamCity &#8226; Redflare\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/17-teamcity-authentication-bypass-cover.png\",\"datePublished\":\"2024-04-24T12:16:53+00:00\",\"dateModified\":\"2024-04-24T12:16:54+00:00\",\"description\":\"CVE-2024-27198: mitigare il bypass dell'autenticazione per proteggere il proprio ambiente TeamCity e rafforzare la sicurezza dei sistemi.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/17-teamcity-authentication-bypass-cover.png\",\"contentUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/17-teamcity-authentication-bypass-cover.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/cve-2024-27198-bypass-autenticazione-teamcity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2024-27198: guida al Bypass dell&#8217;Autenticazione in TeamCity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#website\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\",\"name\":\"Redflare\",\"description\":\"L&#039;invincibilit\u00e0 sta nel conoscere il tuo nemico!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\"},\"alternateName\":\"RF\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.redflare-cyber.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#organization\",\"name\":\"Redflare\",\"alternateName\":\"RF\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Redflare_brand-by-tg.png\",\"contentUrl\":\"https:\\\/\\\/www.redflare-cyber.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Redflare_brand-by-tg.png\",\"width\":1080,\"height\":354,\"caption\":\"Redflare\"},\"image\":{\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/artemis-redflare\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.redflare-cyber.com\\\/#\\\/schema\\\/person\\\/4e308dfb8c13b67d37a14b5cffe8d1b8\",\"name\":\"Alessandro Targa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g\",\"caption\":\"Alessandro Targa\"},\"description\":\"Esperto di cybersecurity con oltre 10 anni di esperienza in protezione digitale e analisi delle minacce informatiche.\",\"sameAs\":[\"https:\\\/\\\/www.redflare-cyber.com\",\"https:\\\/\\\/youtube.com\\\/@artemis-sec?si=euCSc-IqjvJXpZug\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2024-27198: guida al Bypass dell'Autenticazione in TeamCity &#8226; Redflare","description":"CVE-2024-27198: mitigare il bypass dell'autenticazione per proteggere il proprio ambiente TeamCity e rafforzare la sicurezza dei sistemi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.redflare-cyber.com\/en\/cve-2024-27198-bypass-autenticazione-teamcity\/","og_locale":"en_GB","og_type":"article","og_title":"CVE-2024-27198: guida al Bypass dell'Autenticazione in TeamCity &#8226; Redflare","og_description":"CVE-2024-27198: mitigare il bypass dell'autenticazione per proteggere il proprio ambiente TeamCity e rafforzare la sicurezza dei sistemi.","og_url":"https:\/\/www.redflare-cyber.com\/en\/cve-2024-27198-bypass-autenticazione-teamcity\/","og_site_name":"Redflare","article_published_time":"2024-04-24T12:16:53+00:00","article_modified_time":"2024-04-24T12:16:54+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-cover.png","type":"image\/png"}],"author":"Alessandro Targa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alessandro Targa","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/#article","isPartOf":{"@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/"},"author":{"name":"Alessandro Targa","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/person\/4e308dfb8c13b67d37a14b5cffe8d1b8"},"headline":"CVE-2024-27198: guida al Bypass dell&#8217;Autenticazione in TeamCity","datePublished":"2024-04-24T12:16:53+00:00","dateModified":"2024-04-24T12:16:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/"},"wordCount":349,"commentCount":0,"publisher":{"@id":"https:\/\/www.redflare-cyber.com\/#organization"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-cover.png","keywords":["bypass","CVE","cybersecurity","hacking tips","JetBrains","redflare","TeamCity"],"articleSection":["CVE","Cybersecurity"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/","url":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/","name":"CVE-2024-27198: guida al Bypass dell'Autenticazione in TeamCity &#8226; Redflare","isPartOf":{"@id":"https:\/\/www.redflare-cyber.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/#primaryimage"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-cover.png","datePublished":"2024-04-24T12:16:53+00:00","dateModified":"2024-04-24T12:16:54+00:00","description":"CVE-2024-27198: mitigare il bypass dell'autenticazione per proteggere il proprio ambiente TeamCity e rafforzare la sicurezza dei sistemi.","breadcrumb":{"@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/#primaryimage","url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-cover.png","contentUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/04\/17-teamcity-authentication-bypass-cover.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.redflare-cyber.com\/cve-2024-27198-bypass-autenticazione-teamcity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.redflare-cyber.com\/"},{"@type":"ListItem","position":2,"name":"CVE-2024-27198: guida al Bypass dell&#8217;Autenticazione in TeamCity"}]},{"@type":"WebSite","@id":"https:\/\/www.redflare-cyber.com\/#website","url":"https:\/\/www.redflare-cyber.com\/","name":"Redflare","description":"L&#039;invincibilit\u00e0 sta nel conoscere il tuo nemico!","publisher":{"@id":"https:\/\/www.redflare-cyber.com\/#organization"},"alternateName":"RF","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.redflare-cyber.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.redflare-cyber.com\/#organization","name":"Redflare","alternateName":"RF","url":"https:\/\/www.redflare-cyber.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/02\/Redflare_brand-by-tg.png","contentUrl":"https:\/\/www.redflare-cyber.com\/wp-content\/uploads\/2024\/02\/Redflare_brand-by-tg.png","width":1080,"height":354,"caption":"Redflare"},"image":{"@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/showcase\/artemis-redflare\/"]},{"@type":"Person","@id":"https:\/\/www.redflare-cyber.com\/#\/schema\/person\/4e308dfb8c13b67d37a14b5cffe8d1b8","name":"Alessandro Targa","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/409edf075bca556083167001f3703da841b862ab2352f5479028e032a90db4fe?s=96&d=blank&r=g","caption":"Alessandro Targa"},"description":"Esperto di cybersecurity con oltre 10 anni di esperienza in protezione digitale e analisi delle minacce informatiche.","sameAs":["https:\/\/www.redflare-cyber.com","https:\/\/youtube.com\/@artemis-sec?si=euCSc-IqjvJXpZug"]}]}},"_links":{"self":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/2127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/comments?post=2127"}],"version-history":[{"count":9,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/2127\/revisions"}],"predecessor-version":[{"id":2159,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/posts\/2127\/revisions\/2159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/media\/2131"}],"wp:attachment":[{"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/media?parent=2127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/categories?post=2127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.redflare-cyber.com\/en\/wp-json\/wp\/v2\/tags?post=2127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}