{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8924","assignerOrgId":"303448ea-6ef3-4077-ad29-5c9bf253c375","state":"PUBLISHED","assignerShortName":"SN","dateReserved":"2024-09-16T23:37:01.512Z","datePublished":"2024-10-29T16:14:38.836Z","dateUpdated":"2024-10-31T03:55:17.683Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Now Platform","vendor":"ServiceNow","versions":[{"lessThan":"Utah Patch 10b Hot Fix 3","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Vancouver Patch 8 Hot Fix 5","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Vancouver Patch 9 Hot Fix 3b","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Vancouver Patch 10 Hot Fix 2","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Washington DC Patch 4 Hot Fix 2b","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Washington DC Patch 5 Hot Fix 6","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Washington DC Patch 6 Hot Fix 1","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Washington DC Patch 7","status":"affected","version":"0","versionType":"custom"},{"lessThan":"Xanadu Patch 1","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"T-Mobile"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information.&nbsp;</span><span style=\"background-color: var(--wht);\">ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers.&nbsp;</span><span style=\"background-color: var(--wht);\">Further, the vulnerability is addressed in the listed patches and hot fixes.</span><br>"}],"value":"ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information. ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers. Further, the vulnerability is addressed in the listed patches and hot fixes."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"303448ea-6ef3-4077-ad29-5c9bf253c375","shortName":"SN","dateUpdated":"2024-10-29T16:14:38.836Z"},"references":[{"url":"https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706072"}],"source":{"discovery":"UNKNOWN"},"title":"Unauthenticated Blind SQL Injection in Core Platform","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"servicenow","product":"servicenow","cpes":["cpe:2.3:a:servicenow:servicenow:utah:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"Utah","status":"affected","lessThan":"Utah Patch 10b Hot Fix 3","versionType":"custom"}]},{"vendor":"servicenow","product":"servicenow","cpes":["cpe:2.3:a:servicenow:servicenow:vancouver:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"Vancouver","status":"affected","lessThan":"Vancouver Patch 8 Hot Fix 5","versionType":"custom"},{"version":"Vancouver","status":"affected","lessThan":"Vancouver Patch 9 Hot Fix 3b","versionType":"custom"},{"version":"Vancouver","status":"affected","lessThan":"Vancouver Patch 10 Hot Fix 2","versionType":"custom"}]},{"vendor":"servicenow","product":"servicenow","cpes":["cpe:2.3:a:servicenow:servicenow:washington_dc:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"Washington_DC","status":"affected","lessThan":"Washington DC Patch 4 Hot Fix 2b","versionType":"custom"},{"version":"Washington_DC","status":"affected","lessThan":"Washington DC Patch 5 Hot Fix 6","versionType":"custom"},{"version":"Washington_DC","status":"affected","lessThan":"Washington DC Patch 6 Hot Fix 1","versionType":"custom"},{"version":"Washington_DC","status":"affected","lessThan":"Washington DC Patch 7","versionType":"custom"}]},{"vendor":"servicenow","product":"servicenow","cpes":["cpe:2.3:a:servicenow:servicenow:xanadu:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"Xanadu","status":"affected","lessThan":"Xanadu Patch 1","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-30T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2024-8924"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-31T03:55:17.683Z"}}]}}