8.7

CVE-2024-8924

ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information. ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers. Further, the vulnerability is addressed in the listed patches and hot fixes.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ServicenowServicenow Versionxanadu Update-
ServicenowServicenow Versionxanadu Updateearly_availability
ServicenowServicenow Versionxanadu Updateearly_availability_hotfix_1
ServicenowServicenow Versionvancouver Update-
ServicenowServicenow Versionvancouver Updateearly_availability
ServicenowServicenow Versionvancouver Updateearly_availability_hotfix_1
ServicenowServicenow Versionvancouver Updateearly_availability_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_1
ServicenowServicenow Versionvancouver Updatepatch_1_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_10
ServicenowServicenow Versionvancouver Updatepatch_10_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_2
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_2_hotfix1a
ServicenowServicenow Versionvancouver Updatepatch_3
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_3_hotfix_4
ServicenowServicenow Versionvancouver Updatepatch_4
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_1b
ServicenowServicenow Versionvancouver Updatepatch_4_hotfix_2b
ServicenowServicenow Versionvancouver Updatepatch_5
ServicenowServicenow Versionvancouver Updatepatch_5_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_6
ServicenowServicenow Versionvancouver Updatepatch_6_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_6_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_7
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_1a
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2a
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_2b
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_3a
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_3b
ServicenowServicenow Versionvancouver Updatepatch_7_hotfix_4
ServicenowServicenow Versionvancouver Updatepatch_7_hotifix_1a
ServicenowServicenow Versionvancouver Updatepatch_7_hotifix_1b
ServicenowServicenow Versionvancouver Updatepatch_7_hotifix_2a
ServicenowServicenow Versionvancouver Updatepatch_7_hotifix_2b
ServicenowServicenow Versionvancouver Updatepatch_8
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_3
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_4
ServicenowServicenow Versionvancouver Updatepatch_8_hotfix_5
ServicenowServicenow Versionvancouver Updatepatch_9
ServicenowServicenow Versionvancouver Updatepatch_9_hotfix_1
ServicenowServicenow Versionvancouver Updatepatch_9_hotfix_2
ServicenowServicenow Versionvancouver Updatepatch_9_hotfix_2a
ServicenowServicenow Versionvancouver Updatepatch_9_hotfix_2b
ServicenowServicenow Versionvancouver Updatepatch_9_hotfix_3a
ServicenowServicenow Versionwashington_dc Update-
ServicenowServicenow Versionwashington_dc Updateearly_availability
ServicenowServicenow Versionwashington_dc Updateearly_availability_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_1
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_2a
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_2b
ServicenowServicenow Versionwashington_dc Updatepatch_1_hotfix_3b
ServicenowServicenow Versionwashington_dc Updatepatch_2
ServicenowServicenow Versionwashington_dc Updatepatch_2_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_2_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_3
ServicenowServicenow Versionwashington_dc Updatepatch_3_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_3_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_3_hotfix_3
ServicenowServicenow Versionwashington_dc Updatepatch_4
ServicenowServicenow Versionwashington_dc Updatepatch_4_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_4_hotfix_1a
ServicenowServicenow Versionwashington_dc Updatepatch_4_hotfix_1b
ServicenowServicenow Versionwashington_dc Updatepatch_4_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_4_hotfix_2a
ServicenowServicenow Versionwashington_dc Updatepatch_5
ServicenowServicenow Versionwashington_dc Updatepatch_5_hotfix_1
ServicenowServicenow Versionwashington_dc Updatepatch_5_hotfix_2
ServicenowServicenow Versionwashington_dc Updatepatch_5_hotfix_3
ServicenowServicenow Versionwashington_dc Updatepatch_5_hotfix_4
ServicenowServicenow Versionwashington_dc Updatepatch_5_hotfix_5
ServicenowServicenow Versionwashington_dc Updatepatch_5_hotfix_6
ServicenowServicenow Versionwashington_dc Updatepatch_6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.6% 0.686
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
psirt@servicenow.com 8.7 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
psirt@servicenow.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.