Cross-Site Scripting (XSS) vulnerabilities exist in ServiceNow records allowing an authenticated attacker to inject arbitrary scripts.
References
Link | Resource |
---|---|
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1262967 | Vendor Advisory |
https://www.linkedin.com/in/osamay/ | Permissions Required |
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1262967 | Vendor Advisory |
https://www.linkedin.com/in/osamay/ | Permissions Required |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1262967 - Vendor Advisory | |
References | () https://www.linkedin.com/in/osamay/ - Permissions Required | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
06 Jun 2023, 20:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_7a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_7a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_2a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_8:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_3_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_7_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_7b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_10:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_2b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_8_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_8:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_6:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_9:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_9a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_6_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_6_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_4a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_7:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_5_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_5:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_8_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hottix_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_9:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_1_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_8_hotfix_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_9_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_5_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_9b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_2_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_8_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_7b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_3b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_6:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_1:*:*:*:*:*:* |
|
References | (MISC) https://www.linkedin.com/in/osamay/ - Permissions Required | |
References | (MISC) https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1262967 - Vendor Advisory | |
First Time |
Servicenow
Servicenow servicenow |
|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
Information
Published : 2023-05-23 17:15
Updated : 2024-11-21 07:38
NVD link : CVE-2023-1209
Mitre link : CVE-2023-1209
CVE.ORG link : CVE-2023-1209
JSON object : View
Products Affected
servicenow
- servicenow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')