{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8923","assignerOrgId":"303448ea-6ef3-4077-ad29-5c9bf253c375","state":"PUBLISHED","assignerShortName":"SN","dateReserved":"2024-09-16T23:33:41.375Z","datePublished":"2024-10-29T16:07:07.310Z","dateUpdated":"2024-10-31T03:55:16.080Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Now Platform","vendor":"ServiceNow","versions":[{"lessThan":"Vancouver Patch 9 Hot Fix 2a","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Vancouver Patch 10","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Washington DC Patch 4 Hot Fix 1a","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Washington DC Patch 5","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Xanadu GA Release","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"T-Mobile"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.&nbsp;</span><span style=\"background-color: var(--wht);\">ServiceNow deployed an update to hosted instances and ServiceNow provided the update to our partners and self-hosted customers.&nbsp;</span><span style=\"background-color: var(--wht);\">Further, the vulnerability is addressed in the listed patches and hot fixes.</span>"}],"value":"ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow deployed an update to hosted instances and ServiceNow provided the update to our partners and self-hosted customers. Further, the vulnerability is addressed in the listed patches and hot fixes."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"303448ea-6ef3-4077-ad29-5c9bf253c375","shortName":"SN","dateUpdated":"2024-10-29T16:23:19.336Z"},"references":[{"url":"https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706070"}],"source":{"discovery":"UNKNOWN"},"title":"Sandbox Escape in Now Platform","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"servicenow","product":"servicenow","cpes":["cpe:2.3:a:servicenow:servicenow:vancouver:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"Vancouver","status":"affected","lessThan":"Vancouver Patch 9 Hot Fix 2a","versionType":"custom"},{"version":"Vancouver","status":"affected","lessThan":"Vancouver Patch 10","versionType":"custom"}]},{"vendor":"servicenow","product":"servicenow","cpes":["cpe:2.3:a:servicenow:servicenow:washington_dc:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"Washington_DC","status":"affected","lessThan":"Washington DC Patch 4 Hot Fix 1a","versionType":"custom"},{"version":"Washington_DC","status":"affected","lessThan":"Washington DC Patch 5","versionType":"custom"}]},{"vendor":"servicenow","product":"servicenow","cpes":["cpe:2.3:a:servicenow:servicenow:xanadu:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"Xanadu","status":"affected","lessThan":"Xanadu GA Release","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-30T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2024-8923"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-31T03:55:16.080Z"}}]}}