Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-5178

Summary
Assigner-SN
Assigner Org ID-303448ea-6ef3-4077-ad29-5c9bf253c375
Published At-10 Jul, 2024 | 16:23
Updated At-01 Aug, 2024 | 21:03
Rejected At-
Credits

Incomplete Input Validation in SecurelyAccess API

ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server. The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:SN
Assigner Org ID:303448ea-6ef3-4077-ad29-5c9bf253c375
Published At:10 Jul, 2024 | 16:23
Updated At:01 Aug, 2024 | 21:03
Rejected At:
▼CVE Numbering Authority (CNA)
Incomplete Input Validation in SecurelyAccess API

ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server. The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.

Affected Products
Vendor
ServiceNow, Inc.ServiceNow
Product
Now Platform
Default Status
unaffected
Versions
Affected
  • From 0 before Utah Patch 10 Hot Fix 3 (custom)
  • From 0 before Utah Patch 10a Hot Fix 2 (custom)
  • From 0 before Utah Patch 10b Hot Fix 1 (custom)
  • From 0 before Vancouver Patch 6 Hot Fix 2 (custom)
  • From 0 before Vancouver Patch 7 Hot Fix 3b (custom)
  • From 0 before Vancouver Patch 8 Hot Fix 4 (custom)
  • From 0 before Vancouver Patch 9 Hot Fix 1 (custom)
  • From 0 before Vancouver Patch 10 (custom)
  • From 0 before Washington DC Patch 1 Hot Fix 3b (custom)
  • From 0 before Washington DC Patch 2 Hot Fix 2 (custom)
  • From 0 before Washington DC Patch 3 Hot Fix 2 (custom)
  • From 0 before Washington DC Patch 4 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-184CWE-184 Incomplete List of Disallowed Inputs
Type: CWE
CWE ID: CWE-184
Description: CWE-184 Incomplete List of Disallowed Inputs
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
3.14.9MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 4.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Adam Kues
finder
Assetnote Attack Surface Management
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312
N/A
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293
x_login-required
Hyperlink: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312
Resource: N/A
Hyperlink: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293
Resource:
x_login-required
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312
x_transferred
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293
x_login-required
x_transferred
Hyperlink: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312
Resource:
x_transferred
Hyperlink: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293
Resource:
x_login-required
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@servicenow.com
Published At:10 Jul, 2024 | 17:15
Updated At:15 Apr, 2026 | 00:35

ServiceNow has addressed a sensitive file read vulnerability that was identified in the Washington DC, Vancouver, and Utah Now Platform releases. This vulnerability could allow an administrative user to gain unauthorized access to sensitive files on the web application server. The vulnerability is addressed in the listed patches and hot fixes, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.14.9MEDIUM
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 4.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-184Secondarypsirt@servicenow.com
CWE ID: CWE-184
Type: Secondary
Source: psirt@servicenow.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293psirt@servicenow.com
N/A
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312psirt@servicenow.com
N/A
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293
Source: psirt@servicenow.com
Resource: N/A
Hyperlink: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312
Source: psirt@servicenow.com
Resource: N/A
Hyperlink: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2024-5217
Matching Score-6
Assigner-ServiceNow
ShareView Details
Matching Score-6
Assigner-ServiceNow
CVSS Score-9.2||CRITICAL
EPSS-94.11% / 99.91%
||
7 Day CHG~0.00%
Published-10 Jul, 2024 | 16:28
Updated-03 Nov, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2024-08-19||Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Incomplete Input Validation in GlideExpression Script

ServiceNow has addressed an input validation vulnerability that was identified in the Washington DC, Vancouver, and earlier Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. The vulnerability is addressed in the listed patches and hot fixes below, which were released during the June 2024 patching cycle. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.

Action-Not Available
Vendor-ServiceNow, Inc.
Product-servicenowNow PlatformservicenowUtah, Vancouver, and Washington DC Now Platform
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
CWE ID-CWE-697
Incorrect Comparison
CVE-2026-32747
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.09% / 25.51%
||
7 Day CHG~0.00%
Published-19 Mar, 2026 | 21:02
Updated-23 Mar, 2026 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SiYuan: Incomplete sensitive path blocklist in globalCopyFiles allows reading /proc and Docker secrets

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the globalCopyFiles API eads source files using filepath.Abs() with no workspace boundary check, relying solely on util.IsSensitivePath() whose blocklist omits /proc/, /run/secrets/, and home directory dotfiles. An admin can copy /proc/1/environ or Docker secrets into the workspace and read them via the standard file API. An admin can exfiltrate any file readable by the SiYuan process that falls outside the incomplete blocklist. In containerized deployments this includes all injected secrets and environment variables - a common pattern for passing credentials to containers. The exfiltrated files are then accessible via the standard workspace file API and persist until manually deleted. This issue has been fixed in version 3.6.1.

Action-Not Available
Vendor-b3logsiyuan-note
Product-siyuansiyuan
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2026-26067
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.05% / 15.36%
||
7 Day CHG~0.00%
Published-21 Apr, 2026 | 16:16
Updated-22 Apr, 2026 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
October: Safe Mode Bypass via CSS Preprocessor Compilers

October is a Content Management System (CMS) and web platform. Prior to 3.7.14 and 4.1.10, a server-side information disclosure vulnerability was identified in the handling of CSS preprocessor files. Backend users with Editor permissions could craft .less, .sass, or .scss files that leverage the compiler's import functionality to read arbitrary files from the server. This worked even with cms.safe_mode enabled. This vulnerability is fixed in 3.7.14 and 4.1.10.

Action-Not Available
Vendor-octobercms
Product-october
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
CWE ID-CWE-863
Incorrect Authorization
CVE-2026-25525
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-4.9||MEDIUM
EPSS-0.05% / 14.22%
||
7 Day CHG~0.00%
Published-20 Apr, 2026 | 16:14
Updated-23 Apr, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenMage LTS has Path Traversal Filter Bypass in Dataflow Module

Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, the Dataflow module in OpenMage LTS uses a weak blacklist filter (`str_replace('../', '', $input)`) to prevent path traversal attacks. This filter can be bypassed using patterns like `..././` or `....//`, which after the replacement still result in `../`. An authenticated administrator can exploit this to read arbitrary files from the server filesystem. Version 20.17.0 patches the issue.

Action-Not Available
Vendor-openmageOpenMage
Product-magentomagento-lts
CWE ID-CWE-184
Incomplete List of Disallowed Inputs
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Details not found