Skip to content

Service Now - Title Injection

ID: servicenow-title-injection

Severity: high

Author: DhiyaneshDk

Tags: cve,cve2024,servicenow,injection

id: servicenow-title-injection
info:
name: Service Now - Title Injection
author: DhiyaneshDk
severity: high
reference:
- https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data
classification:
cpe: cpe:2.3:a:servicenow:servicenow:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: servicenow
product: servicenow
shodan-query:
- http.favicon.hash:1701804003
- http.title:"servicenow"
fofa-query:
- icon_hash=1701804003
- title="servicenow"
google-query: intitle:"servicenow"
tags: cve,cve2024,servicenow,injection
http:
- method: GET
path:
- "{{BaseURL}}/login.do?jvar_page_title=<style><foo>Injected Title</foo></style>"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title><style><foo>Injected Title</foo></style></title>'
- type: word
part: header
words:
- 'text/html'
- type: status
status:
- 200
# digest: 4b0a00483046022100fc54defb7eacfbb172952824720b807bae46965bf7e04617685cb839e954791b022100d518274f1c8771f57b25704a413d402a9eee4173c5c242fcd976ea6b40e69861:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/servicenow-title-injection.yaml"

View on Github