fkie_cve-2023-1298
Vulnerability from fkie_nvd
Published
2023-07-06 18:15
Modified
2024-12-17 13:58
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
ServiceNow has released upgrades and patches that address a Reflected Cross-Site scripting (XSS) vulnerability that was identified in the ServiceNow Polaris Layout. This vulnerability would enable an authenticated user to inject arbitrary scripts.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1:*:*:*:*:*:*", "matchCriteriaId": "71A44062-D94F-4246-A218-33AD4C43C7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "6A4ABAF4-C84B-4E7B-A156-24640B7D56EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1a:*:*:*:*:*:*", "matchCriteriaId": "2855AE65-1B96-4537-BB6E-7659114955EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1b:*:*:*:*:*:*", "matchCriteriaId": "63725CBE-34A5-4B9E-BA8E-32E66B89C646", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_2:*:*:*:*:*:*", "matchCriteriaId": "8B2DC45C-17A0-4D92-AB29-3497DA43707E", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_2_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "F2822278-2089-4F78-86EE-D63A9516B5A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3:*:*:*:*:*:*", "matchCriteriaId": "49444E5E-0AB7-4083-8663-089955134AA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "8B5E2C3D-F838-48E0-8135-455AF964221D", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "2494C288-83E1-48DF-9661-540B26C9137E", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "815997A7-39CB-4C78-B776-54DECE294AA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_4:*:*:*:*:*:*", "matchCriteriaId": "DE7FDD4B-163B-462A-A80C-454F5040FF90", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4:*:*:*:*:*:*", "matchCriteriaId": "FB55D9E6-FD9C-48A8-800D-10C665120792", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4a:*:*:*:*:*:*", "matchCriteriaId": "D481F300-EDF4-4E22-B865-F3AAFCE27692", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4b:*:*:*:*:*:*", "matchCriteriaId": "311B0413-3771-4CAF-9A14-0726B2923A76", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_5:*:*:*:*:*:*", "matchCriteriaId": "E74913AB-25EE-4F18-B2FA-5C261D7ADE25", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_6:*:*:*:*:*:*", "matchCriteriaId": "5C99222F-B676-471F-8E44-707024B2B097", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7:*:*:*:*:*:*", "matchCriteriaId": "276A7ABE-2437-455C-9C5B-C05CAAC183A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "5719FE4C-B14A-4A68-8C0F-D9BBA8123056", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "2FDD5B2E-8FFF-45A4-BAF4-2091F59ED199", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hottix_3:*:*:*:*:*:*", "matchCriteriaId": "6DA812CC-CF9F-4642-873F-8C0F8DEF9534", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7a:*:*:*:*:*:*", "matchCriteriaId": "05C37C8D-C08F-49E4-BD57-03B61DA4D3BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7b:*:*:*:*:*:*", "matchCriteriaId": "F2371A53-1D57-4508-B18A-4FBA0288CF7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_8:*:*:*:*:*:*", "matchCriteriaId": "BB9E765B-C094-4FC4-B9E3-0732F24C10D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_8_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "406329D1-A894-4D98-BCC0-DFAF25B811DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_8_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "BD9DC522-29A8-457F-AC76-9DD53DCDE80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_9:*:*:*:*:*:*", "matchCriteriaId": "9D6F99C1-F264-4592-AD5F-9A7B04F9D7F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_9a:*:*:*:*:*:*", "matchCriteriaId": "3CD6BD0F-4AC7-4F01-A29C-C94B50BE3B4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_9a_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "379C71B7-CEB3-43B0-B48E-062C6622B19C", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_9b:*:*:*:*:*:*", "matchCriteriaId": "FE62CA6A-14A9-4FB8-80A3-BE8EFF14587B", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:-:*:*:*:*:*:*", "matchCriteriaId": "4332BE18-DA60-4921-A9DF-C434AB32839B", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_1:*:*:*:*:*:*", "matchCriteriaId": "09179BB2-B8D4-4FF9-925E-B5B259EFDF4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_1_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "B328AB49-9C8F-4A0E-86C7-76071156EDAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_1a:*:*:*:*:*:*", "matchCriteriaId": "25F6EDF2-EC52-4821-80A7-1B7DB55CD5FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_1b:*:*:*:*:*:*", "matchCriteriaId": "634CC5CF-5883-44A9-86D9-7DFEADCB4AC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2:*:*:*:*:*:*", "matchCriteriaId": "F5DD8964-4A2D-4CE8-9C45-58E20DB30964", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "5A964834-0D6A-4E63-8A7A-F4B5DF2C1AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "EFEE723D-8418-448A-9005-212B8BDB2C05", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "487E9543-6417-4915-A884-20C4BF457543", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_4:*:*:*:*:*:*", "matchCriteriaId": "E9338643-E8E2-494E-841D-A2756A4A8EAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3:*:*:*:*:*:*", "matchCriteriaId": "FDDF1F29-9BF2-4F82-B375-8BC4E38E6D2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "853308FF-6FE0-480E-8B7A-05C4723FB08A", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "2AE7A9ED-6C15-436D-8CB5-A557BE6064D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "9972BE30-D7DE-4687-BC1D-867790D281A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_4:*:*:*:*:*:*", "matchCriteriaId": "E26FD8E6-C762-4CE1-8B90-7BCBBC372ADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4:*:*:*:*:*:*", "matchCriteriaId": "F76C3CB6-D1DF-433B-ADA8-E1751DCA4FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "C93D663E-D0B4-4EC0-AD81-4932F96E4621", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "38A222AD-CBCC-4AF5-B9F1-ABA8447BE504", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4a:*:*:*:*:*:*", "matchCriteriaId": "C3B9F3D7-B59B-489F-B3E2-F003F57A07B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4a_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "4BB5A2D5-2556-4C7E-BE38-1DD27AF64433", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_5:*:*:*:*:*:*", "matchCriteriaId": "5536AF08-999A-44DC-B9FB-C3FE19D7FA82", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_5_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "4F3AAC35-A807-4F74-AB08-727DF5AA3AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_5_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "AA79BA86-1A6D-4A59-85CB-9E5A807E220D", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_5_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "7F5A0D4A-2D44-428D-B571-D224029C77EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*", "matchCriteriaId": "DB5CA109-5DC1-4952-AC15-69FAC332BCA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ServiceNow has released upgrades and patches that address a Reflected Cross-Site scripting (XSS) vulnerability that was identified in the ServiceNow Polaris Layout. This vulnerability would enable an authenticated user to inject arbitrary scripts.\n" } ], "id": "CVE-2023-1298", "lastModified": "2024-12-17T13:58:11.560", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "psirt@servicenow.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-06T18:15:10.497", "references": [ { "source": "psirt@servicenow.com", "tags": [ "Vendor Advisory" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1310230" }, { "source": "psirt@servicenow.com", "tags": [ "Not Applicable" ], "url": "https://www.linkedin.com/in/osamay/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1310230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://www.linkedin.com/in/osamay/" } ], "sourceIdentifier": "psirt@servicenow.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "psirt@servicenow.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…