There exists a reflected XSS within the logout functionality of ServiceNow versions lower than Quebec Patch 10 Hotfix 11b, Rome Patch 10 Hotfix 3b, San Diego Patch 9, Tokyo Patch 4, and Utah GA. This enables an unauthenticated remote attacker to execute arbitrary JavaScript code in the browser-based web console.
References
Link | Resource |
---|---|
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1272156 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Apr 2023, 19:50
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CWE | CWE-79 | |
References | (MISC) https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1272156 - Vendor Advisory | |
CPE | cpe:2.3:a:servicenow:servicenow:san_diego:patch_6:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_5:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_4a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:early_availability:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_7b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_9:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_8:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_7:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_7b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_5:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_4b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:early_availability:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_1:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_6:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_3:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_8:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:quebec:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_7:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_10:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:tokyo:patch_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_4:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_7a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_4_hotfix_1a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_9a:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:rome:patch_1_hotfix_1b:*:*:*:*:*:* cpe:2.3:a:servicenow:servicenow:san_diego:patch_1_hotfix_1b:*:*:*:*:*:* |
18 Apr 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-17 22:15
Updated : 2024-02-04 23:37
NVD link : CVE-2022-46389
Mitre link : CVE-2022-46389
CVE.ORG link : CVE-2022-46389
JSON object : View
Products Affected
servicenow
- servicenow
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')