Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2024-1588
Vulnerability from csaf_certbund
Published
2024-07-10 22:00
Modified
2024-07-17 22:00
Summary
ServiceNow Now Platform: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die ServiceNow Now Platform ist eine Cloud-basierte Plattform, die Unternehmen bei der Automatisierung und Verwaltung ihrer Geschäftsprozesse unterstützt
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in ServiceNow Now Platform ausnutzen, um beliebigen Code im Kontext des Dienstes auszuführen oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die ServiceNow Now Platform ist eine Cloud-basierte Plattform, die Unternehmen bei der Automatisierung und Verwaltung ihrer Gesch\u00e4ftsprozesse unterst\u00fctzt", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in ServiceNow Now Platform ausnutzen, um beliebigen Code im Kontext des Dienstes auszuf\u00fchren oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1588 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1588.json" }, { "category": "self", "summary": "WID-SEC-2024-1588 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1588" }, { "category": "external", "summary": "ServiceNow Posture vom 2024-07-10", "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154" }, { "category": "external", "summary": "ServiceNow Posture vom 2024-07-10", "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1648313" }, { "category": "external", "summary": "ServiceNow Posture vom 2024-07-10", "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1648312" }, { "category": "external", "summary": "Exploit CVE-2024-4879 vom 2024-07-17", "url": "https://github.com/Praison001/CVE-2024-4879-ServiceNow/blob/main/exploit.py" } ], "source_lang": "en-US", "title": "ServiceNow Now Platform: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-17T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:11:12.758+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1588", "initial_release_date": "2024-07-10T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-17T22:00:00.000+00:00", "number": "2", "summary": "Exploit f\u00fcr CVE-2024-4879 aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Utah \u003c10 Hot Fix 3", "product": { "name": "ServiceNow Now Platform Utah \u003c10 Hot Fix 3", "product_id": "T036108" } }, { "category": "product_version_range", "name": "Utah \u003c10a Hot Fix 2", "product": { "name": "ServiceNow Now Platform Utah \u003c10a Hot Fix 2", "product_id": "T036109" } }, { "category": "product_version_range", "name": "Vancouver \u003c6 Hot Fix 2", "product": { "name": "ServiceNow Now Platform Vancouver \u003c6 Hot Fix 2", "product_id": "T036110" } }, { "category": "product_version_range", "name": "Vancouver \u003c7 Hot Fix 3b", "product": { "name": "ServiceNow Now Platform Vancouver \u003c7 Hot Fix 3b", "product_id": "T036111" } }, { "category": "product_version_range", "name": "Vancouver \u003c8 Hot Fix 4", "product": { "name": "ServiceNow Now Platform Vancouver \u003c8 Hot Fix 4", "product_id": "T036112" } }, { "category": "product_version_range", "name": "Vancouver \u003c9", "product": { "name": "ServiceNow Now Platform Vancouver \u003c9", "product_id": "T036113" } }, { "category": "product_version_range", "name": "Vancouver \u003c10", "product": { "name": "ServiceNow Now Platform Vancouver \u003c10", "product_id": "T036114" } }, { "category": "product_version_range", "name": "Washington DC \u003c1 Hot Fix 2b", "product": { "name": "ServiceNow Now Platform Washington DC \u003c1 Hot Fix 2b", "product_id": "T036115" } }, { "category": "product_version_range", "name": "Washington DC \u003c2 Hot Fix 2", "product": { "name": "ServiceNow Now Platform Washington DC \u003c2 Hot Fix 2", "product_id": "T036116" } }, { "category": "product_version_range", "name": "Washington DC \u003c3 Hot Fix 1", "product": { "name": "ServiceNow Now Platform Washington DC \u003c3 Hot Fix 1", "product_id": "T036117" } }, { "category": "product_version_range", "name": "Washington DC \u003c4", "product": { "name": "ServiceNow Now Platform Washington DC \u003c4", "product_id": "T036118" } } ], "category": "product_name", "name": "Now Platform" } ], "category": "vendor", "name": "ServiceNow" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-4879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der ServiceNow Now Platform. Diese Fehler bestehen im GlideExpression Script, den UI Macros und in der SecurelyAccess API aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code mit den Rechten der Now Platform auszuf\u00fchren oder um Zugriff auf sensible Dateien auf dem Webanwendungsserver zu erhalten." } ], "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-4879" }, { "cve": "CVE-2024-5178", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der ServiceNow Now Platform. Diese Fehler bestehen im GlideExpression Script, den UI Macros und in der SecurelyAccess API aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code mit den Rechten der Now Platform auszuf\u00fchren oder um Zugriff auf sensible Dateien auf dem Webanwendungsserver zu erhalten." } ], "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-5178" }, { "cve": "CVE-2024-5217", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der ServiceNow Now Platform. Diese Fehler bestehen im GlideExpression Script, den UI Macros und in der SecurelyAccess API aufgrund einer unsachgem\u00e4\u00dfen Eingabevalidierung. Ein entfernter, anonymer oder authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code mit den Rechten der Now Platform auszuf\u00fchren oder um Zugriff auf sensible Dateien auf dem Webanwendungsserver zu erhalten." } ], "release_date": "2024-07-10T22:00:00.000+00:00", "title": "CVE-2024-5217" } ] }
CVE-2024-4879 (GCVE-0-2024-4879)
Vulnerability from cvelistv5
Published
2024-07-10 16:16
Modified
2025-07-30 01:36
Severity ?
9.3 (Critical) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-1287 - Improper Validation of Specified Type of Input
Summary
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ServiceNow | Now Platform |
Version: 0 < Utah Patch 10 Hot Fix 3 Version: 0 < Utah Patch 10a Hot Fix 2 Version: 0 < Vancouver Patch 6 Hot Fix 2 Version: 0 < Vancouver Patch 7 Hot Fix 3b Version: 0 < Vancouver Patch 8 Hot Fix 4 Version: 0 < Vancouver Patch 9 Version: 0 < Vancouver Patch 10 Version: 0 < Washington DC Patch 1 Hot Fix 2b Version: 0 < Washington DC Patch 2 Hot Fix 2 Version: 0 < Washington DC Patch 3 Hot Fix 1 Version: 0 < Washington DC Patch 4 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-4879", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T18:58:02.257329Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-07-29", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-4879" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:36:37.385Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-07-29T00:00:00+00:00", "value": "CVE-2024-4879 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:55:10.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154" }, { "tags": [ "x_login-required", "x_transferred" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293" }, { "tags": [ "x_transferred" ], "url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Now Platform", "vendor": "ServiceNow", "versions": [ { "lessThan": "Utah Patch 10 Hot Fix 3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Utah Patch 10a Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 6 Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 7 Hot Fix 3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 8 Hot Fix 4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 9", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 1 Hot Fix 2b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 2 Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 3 Hot Fix 1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Adam Kues" }, { "lang": "en", "type": "finder", "value": "Assetnote Attack Surface Management" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u003c/span\u003e\u0026nbsp;\u003c/span\u003eServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.\u003cdiv\u003e\u003c/div\u003e" } ], "value": "ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1287", "description": "CWE-1287 Improper Validation of Specified Type of Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-29T22:28:49.374Z", "orgId": "303448ea-6ef3-4077-ad29-5c9bf253c375", "shortName": "SN" }, "references": [ { "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1645154" }, { "tags": [ "x_login-required" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293" }, { "url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit" } ], "source": { "discovery": "UNKNOWN" }, "title": "Jelly Template Injection Vulnerability in ServiceNow UI Macros", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "303448ea-6ef3-4077-ad29-5c9bf253c375", "assignerShortName": "SN", "cveId": "CVE-2024-4879", "datePublished": "2024-07-10T16:16:39.926Z", "dateReserved": "2024-05-14T17:39:41.655Z", "dateUpdated": "2025-07-30T01:36:37.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5217 (GCVE-0-2024-5217)
Vulnerability from cvelistv5
Published
2024-07-10 16:28
Modified
2025-07-30 01:36
Severity ?
9.2 (Critical) - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-184 - Incomplete List of Disallowed Inputs
Summary
ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ServiceNow | Now Platform |
Version: 0 < Utah Patch 10 Hot Fix 3 Version: 0 < Utah Patch 10a Hot Fix 2 Version: 0 < Utah Patch 10b Hot Fix 1 Version: 0 < Vancouver Patch 6 Hot Fix 2 Version: 0 < Vancouver Patch 7 Hot Fix 3b Version: 0 < Vancouver Patch 8 Hot Fix 4 Version: 0 < Vancouver Patch 9 Hot Fix 1 Version: 0 < Vancouver Patch 10 Version: 0 < Washington DC Patch 1 Hot Fix 3b Version: 0 < Washington DC Patch 2 Hot Fix 2 Version: 0 < Washington DC Patch 3 Hot Fix 2 Version: 0 < Washington DC Patch 4 Version: 0 < Washington DC Patch 5 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "servicenow", "vendor": "servicenow", "versions": [ { "lessThan": "utah_patch_10_hot_fix_3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10a_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "utah_patch_10b_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_6_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_7_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_8_hot_fix_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_9_hot_fix_1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vancouver_patch_10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_1_hot_fix_3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_2_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_3_hot_fix_2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "washington_dc_patch_5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5217", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T19:00:26.864987Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-07-29", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-5217" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:36:37.186Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-07-29T00:00:00+00:00", "value": "CVE-2024-5217 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:03:11.097Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1648313" }, { "tags": [ "x_login-required", "x_transferred" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293" }, { "tags": [ "x_transferred" ], "url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Now Platform", "vendor": "ServiceNow", "versions": [ { "lessThan": "Utah Patch 10 Hot Fix 3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Utah Patch 10a Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Utah Patch 10b Hot Fix 1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 6 Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 7 Hot Fix 3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 8 Hot Fix 4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 9 Hot Fix 1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 1 Hot Fix 3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 2 Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 3 Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Adam Kues" }, { "lang": "en", "type": "finder", "value": "Assetnote Attack Surface Management" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.\u003c/span\u003e\u003cbr\u003e" } ], "value": "ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 9.2, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-184", "description": "CWE-184 Incomplete List of Disallowed Inputs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-29T22:29:22.478Z", "orgId": "303448ea-6ef3-4077-ad29-5c9bf253c375", "shortName": "SN" }, "references": [ { "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1648313" }, { "tags": [ "x_login-required" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293" }, { "url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit" } ], "source": { "discovery": "UNKNOWN" }, "title": "Incomplete Input Validation in GlideExpression Script", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "303448ea-6ef3-4077-ad29-5c9bf253c375", "assignerShortName": "SN", "cveId": "CVE-2024-5217", "datePublished": "2024-07-10T16:28:32.649Z", "dateReserved": "2024-05-22T18:36:08.570Z", "dateUpdated": "2025-07-30T01:36:37.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5178 (GCVE-0-2024-5178)
Vulnerability from cvelistv5
Published
2024-07-10 16:23
Modified
2024-08-01 21:03
Severity ?
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-184 - Incomplete List of Disallowed Inputs
Summary
ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server. The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ServiceNow | Now Platform |
Version: 0 < Utah Patch 10 Hot Fix 3 Version: 0 < Utah Patch 10a Hot Fix 2 Version: 0 < Utah Patch 10b Hot Fix 1 Version: 0 < Vancouver Patch 6 Hot Fix 2 Version: 0 < Vancouver Patch 7 Hot Fix 3b Version: 0 < Vancouver Patch 8 Hot Fix 4 Version: 0 < Vancouver Patch 9 Hot Fix 1 Version: 0 < Vancouver Patch 10 Version: 0 < Washington DC Patch 1 Hot Fix 3b Version: 0 < Washington DC Patch 2 Hot Fix 2 Version: 0 < Washington DC Patch 3 Hot Fix 2 Version: 0 < Washington DC Patch 4 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5178", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-11T16:42:23.827649Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-11T16:42:33.387Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:03:11.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1648312" }, { "tags": [ "x_login-required", "x_transferred" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Now Platform", "vendor": "ServiceNow", "versions": [ { "lessThan": "Utah Patch 10 Hot Fix 3", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Utah Patch 10a Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Utah Patch 10b Hot Fix 1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 6 Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 7 Hot Fix 3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 8 Hot Fix 4", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 9 Hot Fix 1", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Vancouver Patch 10", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 1 Hot Fix 3b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 2 Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 3 Hot Fix 2", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "Washington DC Patch 4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Adam Kues" }, { "lang": "en", "type": "finder", "value": "Assetnote Attack Surface Management" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server.\u0026nbsp;\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.\u003c/span\u003e\u003cbr\u003e" } ], "value": "ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server.\u00a0The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-184", "description": "CWE-184 Incomplete List of Disallowed Inputs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-11T21:35:29.680Z", "orgId": "303448ea-6ef3-4077-ad29-5c9bf253c375", "shortName": "SN" }, "references": [ { "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1648312" }, { "tags": [ "x_login-required" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1644293" } ], "source": { "discovery": "UNKNOWN" }, "title": "Incomplete Input Validation in SecurelyAccess API", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "303448ea-6ef3-4077-ad29-5c9bf253c375", "assignerShortName": "SN", "cveId": "CVE-2024-5178", "datePublished": "2024-07-10T16:23:39.270Z", "dateReserved": "2024-05-21T16:40:28.169Z", "dateUpdated": "2024-08-01T21:03:11.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…