106 lines
3.2 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-42704",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-13T00:15:09.563",
"lastModified": "2023-01-23T18:36:41.117",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in Employee Service Center (esc) and Service Portal (sp) in ServiceNow Quebec, Rome, and San Diego allows remote attackers to inject arbitrary web script via the Standard Ticket Conversations widget."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:quebec:*:*:*:*:*:*:*",
"matchCriteriaId": "412004C5-93F0-4EC0-B928-E6F41AB95FBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:*:*:*:*:*:*:*",
"matchCriteriaId": "001789AB-E56B-4D04-B1B4-DD326A0CB1C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_1:*:*:*:*:*:*",
"matchCriteriaId": "52C8A7D2-F930-4078-9E9D-E48782E46CBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_2:*:*:*:*:*:*",
"matchCriteriaId": "EAA82A56-93C2-47DC-92BA-D2EBF0C19EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_3:*:*:*:*:*:*",
"matchCriteriaId": "B053530E-1CB3-4A86-BD4B-569750776A53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_4:*:*:*:*:*:*",
"matchCriteriaId": "00EE16EE-B759-4BD8-A30B-C952142C860E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:*:*:*:*:*:*:*",
"matchCriteriaId": "0332F3A4-ABA4-4EE1-955C-C4B4B2B3C881"
}
]
}
]
}
],
"references": [
{
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1216141",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}