Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-4879
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Jelly Template Injection Vulnerability in ServiceNow UI Macros
Source: NVD (National Vulnerability Database)
Vulnerability Description
ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-1287
Source: NVD (National Vulnerability Database)
Vulnerability Title
ServiceNow 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ServiceNow是美国ServiceNow公司的一个云计算平台。以帮助公司管理企业运营的数字工作流程。 ServiceNow存在安全漏洞。攻击者利用该漏洞可以在 Now Platform 环境中远程执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
ServiceNowNow Platform 0 ~ Utah Patch 10 Hot Fix 3 -
II. Public POCs for CVE-2024-4879
#POC DescriptionSource LinkShenlong Link
1CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNowhttps://github.com/Brut-Security/CVE-2024-4879POC Details
2Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerabilityhttps://github.com/bigb0x/CVE-2024-4879POC Details
3Nonehttps://github.com/Mr-r00t11/CVE-2024-4879POC Details
4Nonehttps://github.com/zgimszhd61/CVE-2024-4879POC Details
5Nonehttps://github.com/ShadowByte1/CVE-2024-4879POC Details
6Exploit for CVE-2024-4879 affecting Vancouver, Washington DC Now and Utah Platform releaseshttps://github.com/Praison001/CVE-2024-4879-ServiceNowPOC Details
7CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-ScanningPOC Details
8Python script designed to detect specific vulnerabilities in ServiceNow instances and dump database connection details if the vulnerability is found. This tool is particularly useful for security researchers and penetration testers.https://github.com/jdusane/CVE-2024-4879POC Details
9Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879https://github.com/fa-rrel/CVE-2024-4879POC Details
10Nonehttps://github.com/0xWhoami35/CVE-2024-4879POC Details
11Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879https://github.com/gh-ost00/CVE-2024-4879POC Details
12ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4879.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-4879
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-4879

No comments yet


Leave a comment