cve/2024/CVE-2024-8923.md
2025-09-29 21:09:30 +02:00

21 lines
1.2 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-8923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8923)
![](https://img.shields.io/static/v1?label=Product&message=Now%20Platform&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Vancouver%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Washington_DC%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Xanadu%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brightgreen)
### Description
ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow deployed an update to hosted instances and ServiceNow provided the update to our partners and self-hosted customers. Further, the vulnerability is addressed in the listed patches and hot fixes.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds