fkie_cve-2024-8924
Vulnerability from fkie_nvd
Published
2024-10-29 17:15
Modified
2024-11-27 19:32
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information. ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers. Further, the vulnerability is addressed in the listed patches and hot fixes.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:servicenow:servicenow:xanadu:-:*:*:*:*:*:*", "matchCriteriaId": "7680E7D1-4508-4A4F-99B9-D7690052F185", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:xanadu:early_availability:*:*:*:*:*:*", "matchCriteriaId": "D232F4B4-40DC-4251-92C9-F40D280AEE36", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:xanadu:early_availability_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "49E3A571-83E7-4168-ADF6-49AF92F68EC5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*", "matchCriteriaId": "9DB67FCA-6127-486F-A866-3D5E63B81C35", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:early_availability:*:*:*:*:*:*", "matchCriteriaId": "8702C869-6136-4E0D-9C31-D3F23E9FFEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:early_availability_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "8B094239-6739-4E69-BFF6-7D2797024D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:early_availability_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "4D849F84-F4A9-4AF1-99B6-C57C34BDF4F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*", "matchCriteriaId": "9132AB29-33C1-4825-BAD4-2804C26316B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "68D99613-53A1-4B09-9A78-F8EFA0CC6B01", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_10:*:*:*:*:*:*", "matchCriteriaId": "7E79B8B4-C9CF-4BD4-A634-6DB5EFCAA1FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_10_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "B348587A-4407-4BC5-B4E0-207A283B66F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*", "matchCriteriaId": "E8FCCFB6-DB7E-4DED-A7E0-1C03087754F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "7ED2051C-FE4F-4C0A-A3BF-E33141DC3250", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*", "matchCriteriaId": "8CFD4017-5B8E-4CAF-B9E5-4A675C11F01A", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "40D69E69-DF88-4F8C-A9BD-B642829107E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "4D21A542-15DC-432C-9C60-F7CABE8D4807", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*", "matchCriteriaId": "1596163B-637A-49F9-B01F-C6CC297F7E5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*", "matchCriteriaId": "0B915FDA-9DCB-43B5-8081-F0690996A3EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "7308FA07-5C6D-41AA-9EE1-EE9BAAB50A1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "5ED407E7-9595-4B4D-9D53-1A4807BA327C", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "1EA5B288-54DB-437E-88C2-05F90FF3C918", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*", "matchCriteriaId": "6ED497ED-1588-4CF8-AE83-7CC7BEF8B982", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*", "matchCriteriaId": "A74A3197-68F7-4303-A731-B87A8BF3F831", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "A08FD0FD-E062-4BEC-BE95-0ED2D106826B", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*", "matchCriteriaId": "5F6A6F12-4D7A-4FD3-8FD6-C32D797BB810", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*", "matchCriteriaId": "847F9124-F3C6-4C93-9E80-544CB0580C8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*", "matchCriteriaId": "12808B52-8F7D-4EE0-A43E-85A1C70A6BE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*", "matchCriteriaId": "81880B84-5E9D-4B7F-B1D5-1BF8D25DAF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "8011D2A7-770B-4AE5-80E6-C762F4F0BB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*", "matchCriteriaId": "A58603E3-5AFC-4606-8F9E-1B4FF9A9B843", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "BED5F42A-5FFF-43E0-9BAD-A5E6C1110551", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "ACC24566-0C5A-480D-AA79-19C5E9CE3D70", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*", "matchCriteriaId": "ABE64339-EF0B-4430-9768-FA7DE82AA61F", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "FF79CA67-765A-4CCB-B1CB-EE1FC02CFCFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*", "matchCriteriaId": "A3E71353-9AFF-4B6D-89BC-A2909A7C5DDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "C9C5B57E-7852-4E38-9BDA-864CF6F9DB5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*", "matchCriteriaId": "EAA2E502-FCBC-404D-8FFA-4601F1D5B747", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*", "matchCriteriaId": "650956A6-8DE6-4C16-A77C-2B208B41DF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*", "matchCriteriaId": "A49AC0E0-9164-43AD-959A-55FCB7965858", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3b:*:*:*:*:*:*", "matchCriteriaId": "24A4F6D1-2005-43CA-A282-6B532046CC60", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:*", "matchCriteriaId": "46277115-1A2B-4526-83E8-1446EB5A1EAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:*", "matchCriteriaId": "6CDFB167-F252-46A6-A5F6-EF9A4F93FC03", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:*", "matchCriteriaId": "43DE243B-E90A-4857-A3A6-3A045FE2D75F", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:*", "matchCriteriaId": "33689F99-48DD-47C6-AFAC-DC5D10785860", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:*", "matchCriteriaId": "8F664F1F-5FB2-48B1-93C7-5DF415E673B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*", "matchCriteriaId": "C641B881-7379-448A-A785-3381C72F8353", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "03D48963-936B-4A48-8859-A5066A259E03", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "9149B850-7196-476A-9A27-DEB85B8C6F19", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "10622260-FCBC-4CC0-804E-55D75200FC46", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_4:*:*:*:*:*:*", "matchCriteriaId": "629C9A33-02A6-459E-92F2-A815FFA5BC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_5:*:*:*:*:*:*", "matchCriteriaId": "28C0B816-2DE4-4314-8505-8A7F2EB6AE64", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*", "matchCriteriaId": "CF44F7A1-D153-4723-BA45-0FE4E4725C2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "F9952FD7-E982-471E-933A-812FB24D7180", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "5143ED1D-7B8A-4167-B76D-3946E9920E3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9_hotfix_2a:*:*:*:*:*:*", "matchCriteriaId": "9517E3CB-3473-48B5-942A-E1AC215ECB6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9_hotfix_2b:*:*:*:*:*:*", "matchCriteriaId": "FDB5D38B-DABC-4FD0-BE1F-6153E6209CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9_hotfix_3a:*:*:*:*:*:*", "matchCriteriaId": "5BF8DC1F-48AB-4BAD-83F5-2D370AB4E77C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*", "matchCriteriaId": "FFAC3BF9-2443-4C43-B67A-2BB99297D295", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:early_availability:*:*:*:*:*:*", "matchCriteriaId": "84206FBF-9BE9-489C-AED6-522029D14091", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:early_availability_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "02C383CA-F10F-44F1-9DAE-0CC6C049B83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*", "matchCriteriaId": "444DD275-789F-4C07-9D98-BBFAA1640DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "5B29B708-BD7C-4A6C-9E78-37D045101A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "1F6EDFA3-9014-4AA7-A17F-DDB1FE96588E", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*", "matchCriteriaId": "1DA447CA-A6A2-436C-9909-3F0419B7DD6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:*", "matchCriteriaId": "9F263893-6D34-49D6-9407-ED6CB823595E", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_3b:*:*:*:*:*:*", "matchCriteriaId": "A5BC2E0F-21A6-4AA2-8B4D-C7DEE1D34FC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*", "matchCriteriaId": "D18E2CD1-AC8E-4ABF-88DE-D3E61A297ED1", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "52FC3724-35E5-4C3A-B6BA-3B270EA4255E", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "D663C66D-460F-417E-BC40-D2F0D64246BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*", "matchCriteriaId": "6137BB81-6B48-4DCB-A9F6-A27D869C12FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "B06EABB5-0327-4816-AC7B-34D021758812", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "9AE9E970-A457-4D7F-91F0-B7A0956C4115", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "5E117698-641B-4A61-A0A1-5360A6A47EC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:*", "matchCriteriaId": "29DC5FC9-2ACF-4C51-93C4-2D0982BA0CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "F527AEBC-C859-45A2-B9A3-B627B99430AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4_hotfix_1a:*:*:*:*:*:*", "matchCriteriaId": "866088B4-F98B-4C76-BE9C-01505DCA0422", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4_hotfix_1b:*:*:*:*:*:*", "matchCriteriaId": "84A86B15-85A4-43B0-A848-F6BDE6F925D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "DA24D4D4-9531-4A39-82AB-C559AD956821", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4_hotfix_2a:*:*:*:*:*:*", "matchCriteriaId": "E038E7CE-F29B-4684-A20A-BD564C2F72D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5:*:*:*:*:*:*", "matchCriteriaId": "9CD5A918-9B71-4CFD-A6DB-437D3B647C6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5_hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "A8CB6895-5EA1-4D97-B563-ED192B4ADA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5_hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "17D05A6C-5B6B-4DF0-A2A6-D23C05B55FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "2514E534-4160-4B28-B4B3-FF8DDDE6F7F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5_hotfix_4:*:*:*:*:*:*", "matchCriteriaId": "4533B128-E765-4542-938F-5CF254249C15", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5_hotfix_5:*:*:*:*:*:*", "matchCriteriaId": "98E4AFA9-6551-4D22-AFB1-666936DC311D", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5_hotfix_6:*:*:*:*:*:*", "matchCriteriaId": "F72D90CB-C5EB-4F03-B320-0ACF9397C724", "vulnerable": true }, { "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_6:*:*:*:*:*:*", "matchCriteriaId": "AA936070-C32B-4539-A14F-1F6965A01107", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information.\u00a0ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers.\u00a0Further, the vulnerability is addressed in the listed patches and hot fixes." }, { "lang": "es", "value": "ServiceNow ha solucionado una vulnerabilidad de inyecci\u00f3n SQL ciega que se identific\u00f3 en la plataforma Now. Esta vulnerabilidad podr\u00eda permitir que un usuario no autenticado extraiga informaci\u00f3n no autorizada. ServiceNow implement\u00f3 una actualizaci\u00f3n en las instancias alojadas y proporcion\u00f3 la actualizaci\u00f3n a nuestros socios y clientes alojados por ellos mismos. Adem\u00e1s, la vulnerabilidad se soluciona en los parches y correcciones urgentes que se indican." } ], "id": "CVE-2024-8924", "lastModified": "2024-11-27T19:32:01.823", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "psirt@servicenow.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "availabilityRequirement": "NOT_DEFINED", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "psirt@servicenow.com", "type": "Secondary" } ] }, "published": "2024-10-29T17:15:04.983", "references": [ { "source": "psirt@servicenow.com", "tags": [ "Vendor Advisory" ], "url": "https://support.servicenow.com/kb?id=kb_article_view\u0026sysparm_article=KB1706072" } ], "sourceIdentifier": "psirt@servicenow.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "psirt@servicenow.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…