Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| ServiceNow | Now Platform | 0 ~ Utah Patch 10 Hot Fix 3 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow | https://github.com/Brut-Security/CVE-2024-4879 | POC Details |
| 2 | Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability | https://github.com/bigb0x/CVE-2024-4879 | POC Details |
| 3 | None | https://github.com/Mr-r00t11/CVE-2024-4879 | POC Details |
| 4 | None | https://github.com/zgimszhd61/CVE-2024-4879 | POC Details |
| 5 | None | https://github.com/ShadowByte1/CVE-2024-4879 | POC Details |
| 6 | Exploit for CVE-2024-4879 affecting Vancouver, Washington DC Now and Utah Platform releases | https://github.com/Praison001/CVE-2024-4879-ServiceNow | POC Details |
| 7 | CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it. | https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning | POC Details |
| 8 | Python script designed to detect specific vulnerabilities in ServiceNow instances and dump database connection details if the vulnerability is found. This tool is particularly useful for security researchers and penetration testers. | https://github.com/jdusane/CVE-2024-4879 | POC Details |
| 9 | Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879 | https://github.com/fa-rrel/CVE-2024-4879 | POC Details |
| 10 | None | https://github.com/0xWhoami35/CVE-2024-4879 | POC Details |
| 11 | Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879 | https://github.com/gh-ost00/CVE-2024-4879 | POC Details |
| 12 | ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4879.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet