top of page

ServiceNow Code Execution (CVE-2024-4879)



Application Details

ServiceNow is a platform for business transformation. Through their modules, ServiceNow can be used for anything ranging from HR and employee management, to automation workflows, or as a knowledge-base.


Vulnerability

ServiceNow could allow a remote attacker to execute arbitrary code on the system, caused by a jelly template injection vulnerability in UI Macros.


Identification

ServiceNow receives data that is expected to be of a certain type, however the application neither validate nor incorrectly validates inputted data. When inputted data does not comply with the expected type, an attacker could trigger unexpected errors, cause incorrect actions to take place, or exploit latent vulnerabilities that would not be possible if the inputted data conformed with the expected type. This weakness can appear in type-unsafe programming languages, or in programming languages that support casting or conversion of an input to another type.


GET /login.do?jvar_page_title=<style><j:jelly%20xmlns:j="jelly"%20xmlns:g='glide'><g:evaluate>gs.addErrorMessage(7*7);</g:evaluate></j:jelly></style>

Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to execute arbitrary code on the system.


Coverage

Idappcom have created signature 8025141 along with a traffic file for this vulnerability.


References


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional

コメント


bottom of page