mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
385 lines
16 KiB
JSON
385 lines
16 KiB
JSON
{
|
|
"id": "CVE-2022-39048",
|
|
"sourceIdentifier": "psirt@servicenow.com",
|
|
"published": "2023-04-10T14:15:07.453",
|
|
"lastModified": "2024-11-21T07:17:27.043",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A XSS vulnerability was identified in the ServiceNow UI page assessment_redirect. To exploit this vulnerability, an attacker would need to persuade an authenticated user to click a maliciously crafted URL. Successful exploitation potentially could be used to conduct various client-side attacks, including, but not limited to, phishing, redirection, theft of CSRF tokens, and use of an authenticated user's browser or session to attack other systems.\n\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "psirt@servicenow.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:quebec:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5A68765-7406-48CB-965E-6C09A7465CF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:quebec:patch_10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8816E561-8E81-4C30-9C48-7836069202D9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "52C8A7D2-F930-4078-9E9D-E48782E46CBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "512C81E4-0C27-42EC-AD05-7563B50EF1DD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A5BBA03C-2A2E-4259-9F8E-99622F6758B7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D609B90C-E67E-461A-8756-36E06E265FF0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A05F1AF-0E08-4280-A006-A27C917C9E82"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5E3198D2-CC9C-46F7-A366-6C16F3F35439"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD0D5C00-C5D2-4E30-BEB7-AA2ACBE68CF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5B1C958-54DF-45BE-BD2B-60A44B846971"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_10_hotfix_2a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6BE785D2-A5C9-4ED7-968A-C01F257E8514"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EAA82A56-93C2-47DC-92BA-D2EBF0C19EEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_2_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4FEEDD5-F852-49AA-BDF9-869040C7F3C4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_2_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "763B0915-14EF-4405-AAB6-78B185D5744B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B053530E-1CB3-4A86-BD4B-569750776A53"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_3_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CF1B2AB-D561-4396-AA99-71FCD55B5D3E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00EE16EE-B759-4BD8-A30B-C952142C860E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1F157018-E6F2-45D1-8B54-68C051247798"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88603AEF-0EC2-4006-B7F2-E5FFAC8F354C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB5BC2C0-A5CF-455F-A732-E49672B5682E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "66E9CCC4-7BC4-4FC2-8B54-B8746A83256C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_5_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "56E7DB16-6ABC-4ED3-99C1-A33914242405"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_5_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55AC0E29-0F51-4D1D-A5EF-AECD29FAE417"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DCC0D37-6840-4882-84E1-AE1E83ABF31B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_6_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF53F785-2D19-48FB-9D88-9817785E5082"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_6_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9EAAADE1-5804-44FB-BD9A-881BDA4FE1F0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC20DB81-AA27-4BE5-9296-2E4E6000F56B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_7_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DECC9979-3A0B-4F36-85D1-DD539A7D18C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_7a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "563F3D85-A23A-453F-9932-3044F8B5566C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_7b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C770579-EDDC-4F46-8288-33A13289A8A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78447698-90FF-4010-BF0B-3294E2EBB69B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_8_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A32EF135-C229-49B1-8766-1ED6066C7CC8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_8_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "22E5BA6F-6C66-4589-8AA9-C76776DCFCCB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_9:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AE93BECE-CC4A-400A-9322-5E61DA5E6A75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_9_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38D3CF30-CAC5-49B1-B527-9C9D24C28A54"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_9a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C48A10D-0295-4023-AB20-0BE4D8AA582A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_9b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F42AF52-C388-44BB-B328-5E77CF9E4622"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71A44062-D94F-4246-A218-33AD4C43C7FF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6A4ABAF4-C84B-4E7B-A156-24640B7D56EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2855AE65-1B96-4537-BB6E-7659114955EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63725CBE-34A5-4B9E-BA8E-32E66B89C646"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B2DC45C-17A0-4D92-AB29-3497DA43707E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_2_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2822278-2089-4F78-86EE-D63A9516B5A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49444E5E-0AB7-4083-8663-089955134AA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8B5E2C3D-F838-48E0-8135-455AF964221D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2494C288-83E1-48DF-9661-540B26C9137E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "815997A7-39CB-4C78-B776-54DECE294AA1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_3_hotfix_4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DE7FDD4B-163B-462A-A80C-454F5040FF90"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FB55D9E6-FD9C-48A8-800D-10C665120792"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D481F300-EDF4-4E22-B865-F3AAFCE27692"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_4b:*:*:*:*:*:*",
|
|
"matchCriteriaId": "311B0413-3771-4CAF-9A14-0726B2923A76"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_6:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C99222F-B676-471F-8E44-707024B2B097"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "276A7ABE-2437-455C-9C5B-C05CAAC183A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:patch_8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB9E765B-C094-4FC4-B9E3-0732F24C10D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4332BE18-DA60-4921-A9DF-C434AB32839B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:tokyo:patch1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B73C50B-B52A-41E0-9B5B-E84CEA5503B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "69E0078E-1953-4F4F-9D5A-B1A140C4B310"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://support.servicenow.com/",
|
|
"source": "psirt@servicenow.com"
|
|
},
|
|
{
|
|
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1221892",
|
|
"source": "psirt@servicenow.com"
|
|
},
|
|
{
|
|
"url": "https://support.servicenow.com/",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1221892",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |