Skip to content

Exploit for CVE-2024-4879 affecting Vancouver, Washington DC Now and Utah Platform releases

Notifications You must be signed in to change notification settings

Praison001/CVE-2024-4879-ServiceNow

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

CVE-2024-4879-ServiceNow

ServiceNow is a platform for business transformation which helps companies manage digital workflows for enterprise operations.

CVE-2024-4879 could allow an unauthenticated user to remotely execute code within the Now Platform. This vulnerability exploits three issues by chaining them together: Title Injection, Template Injection Mitigation Bypass, and Filesystem Filter Bypass, to access ServiceNow data.

The affected versions include Vancouver, Washington DC Now and Utah platform releases

Usage: python3 exploit.py -i < target_IP >

Usage example: python3 exploit.py -i 127.0.0.1

Disclaimer: This exploit is to be used only for educational and authorized testing purposes. Illegal/unauthorized use of this exploit is prohibited. I am not responsible for any misuse or damage caused by this script.

References: https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data

About

Exploit for CVE-2024-4879 affecting Vancouver, Washington DC Now and Utah Platform releases

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages