CVE-2024-8924

Nov. 7, 2024, 5:16 p.m.

7.5
High

Description

ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information. ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers. Further, the vulnerability is addressed in the listed patches and hot fixes.

Product(s) Impacted

Vendor Product Versions
Servicenow
  • Servicenow
  • vancouver, washington_dc, xanadu

Weaknesses

CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

*CPE(s)

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a servicenow servicenow vancouver - / / / / / /
a servicenow servicenow vancouver patch_1 / / / / / /
a servicenow servicenow vancouver patch_2 / / / / / /
a servicenow servicenow vancouver patch_2_hotfix_1a / / / / / /
a servicenow servicenow vancouver patch_4 / / / / / /
a servicenow servicenow vancouver patch_4_hotfix_1a / / / / / /
a servicenow servicenow vancouver patch_4_hotfix_1b / / / / / /
a servicenow servicenow vancouver patch_5 / / / / / /
a servicenow servicenow vancouver patch_6 / / / / / /
a servicenow servicenow vancouver patch_7_hotifix_1a / / / / / /
a servicenow servicenow vancouver patch_7_hotifix_1b / / / / / /
a servicenow servicenow vancouver patch_7_hotifix_2a / / / / / /
a servicenow servicenow vancouver patch_7_hotifix_2b / / / / / /
a servicenow servicenow vancouver patch_8 / / / / / /
a servicenow servicenow vancouver ptach_7 / / / / / /
a servicenow servicenow washington_dc - / / / / / /
a servicenow servicenow washington_dc patch_1 / / / / / /
a servicenow servicenow washington_dc patch_1_hotfix_2a / / / / / /
a servicenow servicenow washington_dc patch_2 / / / / / /
a servicenow servicenow washington_dc patch_3 / / / / / /
a servicenow servicenow washington_dc patch_4_hotfix_2a / / / / / /
a servicenow servicenow washington_dc patch_5 / / / / / /
a servicenow servicenow xanadu - / / / / / /

CVSS Score

7.5 / 10

CVSS Data

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: NONE
  • Availability Impact: NONE
  • View Vector String

    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Date

  • Published: Oct. 29, 2024, 5:15 p.m.
  • Last Modified: Nov. 7, 2024, 5:16 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

psirt@servicenow.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.