report_viewer.do in ServiceNow Release Jakarta Patch 8 and earlier allows remote attackers to execute arbitrary code via '${xyz}' Glide Scripting Injection in the sysparm_media parameter.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://telekomsecurity.github.io/2018/07/servicenow-privilege-escalation.html | third party advisory exploit |
https://telekomsecurity.github.io/assets/advisories/20180104_ServiceNow_GlideInjection.txt | third party advisory exploit |