6.1

CVE-2022-46389

There exists a reflected XSS within the logout functionality of ServiceNow versions lower than Quebec Patch 10 Hotfix 11b, Rome Patch 10 Hotfix 3b, San Diego Patch 9, Tokyo Patch 4, and Utah GA. This enables an unauthenticated remote attacker to execute arbitrary JavaScript code in the browser-based web console.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ServicenowServicenow Versionquebec Update-
ServicenowServicenow Versionrome Update-
ServicenowServicenow Versionrome Updateearly_availability
ServicenowServicenow Versionrome Updatepatch_1
ServicenowServicenow Versionrome Updatepatch_1_hotfix_1a
ServicenowServicenow Versionrome Updatepatch_1_hotfix_1b
ServicenowServicenow Versionrome Updatepatch_10
ServicenowServicenow Versionrome Updatepatch_2
ServicenowServicenow Versionrome Updatepatch_3
ServicenowServicenow Versionrome Updatepatch_4
ServicenowServicenow Versionrome Updatepatch_4_hotfix_1
ServicenowServicenow Versionrome Updatepatch_4_hotfix_1a
ServicenowServicenow Versionrome Updatepatch_4_hotfix_1b
ServicenowServicenow Versionrome Updatepatch_5
ServicenowServicenow Versionrome Updatepatch_6
ServicenowServicenow Versionrome Updatepatch_7
ServicenowServicenow Versionrome Updatepatch_7a
ServicenowServicenow Versionrome Updatepatch_7b
ServicenowServicenow Versionrome Updatepatch_8
ServicenowServicenow Versionrome Updatepatch_9
ServicenowServicenow Versionrome Updatepatch_9a
ServicenowServicenow Versionsan_diego Update-
ServicenowServicenow Versionsan_diego Updatepatch_1
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1a
ServicenowServicenow Versionsan_diego Updatepatch_1_hotfix_1b
ServicenowServicenow Versionsan_diego Updatepatch_2
ServicenowServicenow Versionsan_diego Updatepatch_3
ServicenowServicenow Versionsan_diego Updatepatch_4
ServicenowServicenow Versionsan_diego Updatepatch_4a
ServicenowServicenow Versionsan_diego Updatepatch_4b
ServicenowServicenow Versionsan_diego Updatepatch_5
ServicenowServicenow Versionsan_diego Updatepatch_6
ServicenowServicenow Versionsan_diego Updatepatch_7
ServicenowServicenow Versionsan_diego Updatepatch_7b
ServicenowServicenow Versionsan_diego Updatepatch_8
ServicenowServicenow Versiontokyo Update-
ServicenowServicenow Versiontokyo Updateearly_availability
ServicenowServicenow Versiontokyo Updatepatch_1
ServicenowServicenow Versiontokyo Updatepatch_1a
ServicenowServicenow Versiontokyo Updatepatch_1b
ServicenowServicenow Versiontokyo Updatepatch_2
ServicenowServicenow Versiontokyo Updatepatch_3
ServicenowServicenow Versionutah Update-
ServicenowServicenow Versionutah Updateearly_availability
ServicenowServicenow Versionutah Updatepatch_1
ServicenowServicenow Versionutah Updatepatch_2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.49% 0.652
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
psirt@servicenow.com 6.1 2.8 2.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.