Lucene search

K
cvelistSNCVELIST:CVE-2024-5217
HistoryJul 10, 2024 - 4:28 p.m.

CVE-2024-5217 Incomplete Input Validation in GlideExpression Script

2024-07-1016:28:32
CWE-184
SN
www.cve.org
12
input validation
glideexpression script
servicenow
washington dc
vancouver
now platform
vulnerability
remote code execution
unauthenticated user
security patches
june 2024 patching cycle

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

EPSS

0.961

Percentile

99.5%

ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.Β The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Now Platform",
    "vendor": "ServiceNow",
    "versions": [
      {
        "lessThan": "Utah Patch 10 Hot Fix 3",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Utah Patch 10a Hot Fix 2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Utah Patch 10b Hot Fix 1",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Vancouver Patch 6 Hot Fix 2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Vancouver Patch 7 Hot Fix 3b",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Vancouver Patch 8 Hot Fix 4",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Vancouver Patch 9 Hot Fix 1",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Vancouver Patch 10",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Washington DC Patch 1 Hot Fix 3b",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Washington DC Patch 2 Hot Fix 2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Washington DC Patch 3 Hot Fix 2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Washington DC Patch 4",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "Washington DC Patch 5",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

9.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

EPSS

0.961

Percentile

99.5%