mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
378 lines
15 KiB
JSON
378 lines
15 KiB
JSON
{
|
|
"id": "CVE-2023-1298",
|
|
"sourceIdentifier": "psirt@servicenow.com",
|
|
"published": "2023-07-06T18:15:10.497",
|
|
"lastModified": "2023-07-14T19:51:07.543",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ServiceNow has released upgrades and patches that address a Reflected Cross-Site scripting (XSS) vulnerability that was identified in the ServiceNow Polaris Layout. This vulnerability would enable an authenticated user to inject arbitrary scripts.\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
},
|
|
{
|
|
"source": "psirt@servicenow.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.3,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "psirt@servicenow.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71A44062-D94F-4246-A218-33AD4C43C7FF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A4ABAF4-C84B-4E7B-A156-24640B7D56EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2855AE65-1B96-4537-BB6E-7659114955EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63725CBE-34A5-4B9E-BA8E-32E66B89C646"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B2DC45C-17A0-4D92-AB29-3497DA43707E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_2_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2822278-2089-4F78-86EE-D63A9516B5A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49444E5E-0AB7-4083-8663-089955134AA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B5E2C3D-F838-48E0-8135-455AF964221D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2494C288-83E1-48DF-9661-540B26C9137E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "815997A7-39CB-4C78-B776-54DECE294AA1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE7FDD4B-163B-462A-A80C-454F5040FF90"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB55D9E6-FD9C-48A8-800D-10C665120792"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D481F300-EDF4-4E22-B865-F3AAFCE27692"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "311B0413-3771-4CAF-9A14-0726B2923A76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E74913AB-25EE-4F18-B2FA-5C261D7ADE25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C99222F-B676-471F-8E44-707024B2B097"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "276A7ABE-2437-455C-9C5B-C05CAAC183A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5719FE4C-B14A-4A68-8C0F-D9BBA8123056"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FDD5B2E-8FFF-45A4-BAF4-2091F59ED199"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7_hottix_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DA812CC-CF9F-4642-873F-8C0F8DEF9534"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "05C37C8D-C08F-49E4-BD57-03B61DA4D3BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2371A53-1D57-4508-B18A-4FBA0288CF7B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB9E765B-C094-4FC4-B9E3-0732F24C10D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_8_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "406329D1-A894-4D98-BCC0-DFAF25B811DC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_8_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD9DC522-29A8-457F-AC76-9DD53DCDE80E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D6F99C1-F264-4592-AD5F-9A7B04F9D7F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_9a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3CD6BD0F-4AC7-4F01-A29C-C94B50BE3B4C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_9a_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "379C71B7-CEB3-43B0-B48E-062C6622B19C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_9b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FE62CA6A-14A9-4FB8-80A3-BE8EFF14587B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4332BE18-DA60-4921-A9DF-C434AB32839B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09179BB2-B8D4-4FF9-925E-B5B259EFDF4F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_1_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B328AB49-9C8F-4A0E-86C7-76071156EDAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_1a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25F6EDF2-EC52-4821-80A7-1B7DB55CD5FC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_1b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "634CC5CF-5883-44A9-86D9-7DFEADCB4AC0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5DD8964-4A2D-4CE8-9C45-58E20DB30964"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5A964834-0D6A-4E63-8A7A-F4B5DF2C1AAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EFEE723D-8418-448A-9005-212B8BDB2C05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "487E9543-6417-4915-A884-20C4BF457543"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_2_hotfix_4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9338643-E8E2-494E-841D-A2756A4A8EAB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDDF1F29-9BF2-4F82-B375-8BC4E38E6D2D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "853308FF-6FE0-480E-8B7A-05C4723FB08A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2AE7A9ED-6C15-436D-8CB5-A557BE6064D0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9972BE30-D7DE-4687-BC1D-867790D281A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_3_hotfix_4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E26FD8E6-C762-4CE1-8B90-7BCBBC372ADA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F76C3CB6-D1DF-433B-ADA8-E1751DCA4FE7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C93D663E-D0B4-4EC0-AD81-4932F96E4621"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4_hotfix_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38A222AD-CBCC-4AF5-B9F1-ABA8447BE504"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C3B9F3D7-B59B-489F-B3E2-F003F57A07B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_4a_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BB5A2D5-2556-4C7E-BE38-1DD27AF64433"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5536AF08-999A-44DC-B9FB-C3FE19D7FA82"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_5_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F3AAC35-A807-4F74-AB08-727DF5AA3AA2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_5_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AA79BA86-1A6D-4A59-85CB-9E5A807E220D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch_5_hotfix_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F5A0D4A-2D44-428D-B571-D224029C77EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2D3CBD5-6241-4DA1-9D98-FA6076ACD696"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1310230",
|
|
"source": "psirt@servicenow.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.linkedin.com/in/osamay/",
|
|
"source": "psirt@servicenow.com",
|
|
"tags": [
|
|
"Not Applicable"
|
|
]
|
|
}
|
|
]
|
|
} |