9.8

CVE-2024-4879

Warnung
Medienbericht
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ServicenowServicenow Versionutah Update-
ServicenowServicenow Versionutah Updateearly_availability
ServicenowServicenow Versionutah Updatepatch_1
ServicenowServicenow Versionutah Updatepatch_1_hotfix_1
ServicenowServicenow Versionutah Updatepatch_1_hotfix_1a
ServicenowServicenow Versionutah Updatepatch_1_hotfix_1b
ServicenowServicenow Versionutah Updatepatch_1_hotfix_2
ServicenowServicenow Versionutah Updatepatch_10
ServicenowServicenow Versionutah Updatepatch_10_hotfix_1
ServicenowServicenow Versionutah Updatepatch_10_hotfix_2
ServicenowServicenow Versionutah Updatepatch_10a
ServicenowServicenow Versionutah Updatepatch_10a_hotfix_1
ServicenowServicenow Versionutah Updatepatch_2
ServicenowServicenow Versionutah Updatepatch_2_hotfix_1
ServicenowServicenow Versionutah Updatepatch_2_hotfix_2
ServicenowServicenow Versionutah Updatepatch_2_hotfix_3
ServicenowServicenow Versionutah Updatepatch_2_hotfix_4
ServicenowServicenow Versionutah Updatepatch_3
ServicenowServicenow Versionutah Updatepatch_3_hotfix_1
ServicenowServicenow Versionutah Updatepatch_3_hotfix_1b
ServicenowServicenow Versionutah Updatepatch_4
ServicenowServicenow Versionutah Updatepatch_4_hotfix_1
ServicenowServicenow Versionutah Updatepatch_4_hotfix_2
ServicenowServicenow Versionutah Updatepatch_4_hotfix_2a
ServicenowServicenow Versionutah Updatepatch_4_hotfix_2b
ServicenowServicenow Versionutah Updatepatch_4_hotfix_3
ServicenowServicenow Versionutah Updatepatch_4_hotfix_3b
ServicenowServicenow Versionutah Updatepatch_4_hotfix_4
ServicenowServicenow Versionutah Updatepatch_4_hotfix_4b
ServicenowServicenow Versionutah Updatepatch_4_hotfix_5
ServicenowServicenow Versionutah Updatepatch_5
ServicenowServicenow Versionutah Updatepatch_5_hotfix_1
ServicenowServicenow Versionutah Updatepatch_6
ServicenowServicenow Versionutah Updatepatch_6_hotfix_1
ServicenowServicenow Versionutah Updatepatch_6_hotfix_2
ServicenowServicenow Versionutah Updatepatch_7
ServicenowServicenow Versionutah Updatepatch_7_hotfix_1
ServicenowServicenow Versionutah Updatepatch_7_hotfix_2
ServicenowServicenow Versionutah Updatepatch_7a
ServicenowServicenow Versionutah Updatepatch_7b
ServicenowServicenow Versionutah Updatepatch_8
ServicenowServicenow Versionutah Updatepatch_8_hotfix_2
ServicenowServicenow Versionutah Updatepatch_9
ServicenowServicenow Versionutah Updatepatch_9_hotfix_1
ServicenowServicenow Versionutah Updatepatch_9_hotfix_1a
ServicenowServicenow Versionutah Updatepatch_9_hotfix_1b
ServicenowServicenow Versionvancouver Update-
ServicenowServicenow Versionvancouver Updatepatch_1
ServicenowServicenow Versionvancouver Updatepatch_1_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_10
ServicenowServicenow Versionvancouver Updatepatch_2
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix1a
ServicenowServicenow Versionvancouver Updatepatch_3
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_4
ServicenowServicenow Versionvancouver Updatepatch_4
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1b
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_2b
ServicenowServicenow Versionvancouver Updatepatch_5
ServicenowServicenow Versionvancouver Updatepatch_5_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_6
ServicenowServicenow Versionvancouver Updatepatch_6_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_7
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2a
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2b
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_3a
ServicenowServicenow Versionvancouver Updatepatch_8
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_9
ServicenowServicenow Versionwashington_dc Update-
ServicenowServicenow Versionwashington_dc Updatepatch_1
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_2a
ServicenowServicenow Versionwashington_dc Updatepatch_2
ServicenowServicenow Versionwashington_dc Updatepatch_2_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_3

29.07.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

ServiceNow Improper Input Validation Vulnerability

Schwachstelle

ServiceNow Utah, Vancouver, and Washington DC Now Platform releases contain a jelly template injection vulnerability in UI macros. An unauthenticated user could exploit this vulnerability to execute code remotely.

Beschreibung

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.35% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
psirt@servicenow.com 9.3 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
psirt@servicenow.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-1287 Improper Validation of Specified Type of Input

The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.