CVE-2024-8924

7.5 HIGH

📋 TL;DR

ServiceNow Now Platform has a blind SQL injection vulnerability that allows unauthenticated attackers to extract unauthorized information from the database. This affects ServiceNow hosted instances and self-hosted customers. The vulnerability has been patched by ServiceNow.

💻 Affected Systems

Products:
  • ServiceNow Now Platform
Versions: Specific versions not disclosed in advisory - check ServiceNow KB for affected releases
Operating Systems: All platforms running ServiceNow
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both ServiceNow-hosted and self-hosted instances. Vulnerability exists in the platform itself, not dependent on specific configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive customer data, configuration secrets, and user credentials

🟠

Likely Case

Extraction of sensitive business data, user information, and configuration details

🟢

If Mitigated

No impact if patched or proper network controls prevent access

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows external attackers to target exposed instances
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this without authentication

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Blind SQL injection requires specialized techniques but unauthenticated access lowers barrier. No public exploit code available at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ServiceNow KB1706072 for specific patch versions

Vendor Advisory: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706072

Restart Required: Yes

Instructions:

1. Access ServiceNow instance admin console. 2. Check current platform version. 3. Apply ServiceNow-provided patch or hotfix. 4. Restart ServiceNow instance. 5. Verify patch application.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to ServiceNow instances to authorized networks only

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ServiceNow instances
  • Deploy intrusion detection/prevention systems with SQL injection signatures

🔍 How to Verify

Check if Vulnerable:

Check ServiceNow instance version against affected versions in KB1706072

Check Version:

Check ServiceNow System Properties > System Information for platform version

Verify Fix Applied:

Verify patch installation through ServiceNow admin console and confirm version is updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual database query patterns
  • Multiple failed SQL-like requests from single source
  • Requests with SQL syntax in parameters

Network Indicators:

  • Unusual outbound database connections
  • Patterns of timed boolean-based requests

SIEM Query:

source="servicenow" AND (url="*sql*" OR parameters="*SELECT*" OR parameters="*UNION*" OR parameters="*WAITFOR*" OR parameters="*SLEEP*")

🔗 References

📤 Share & Export