Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-4879 PoC — Jelly Template Injection Vulnerability in ServiceNow UI Macros

Source
Associated Vulnerability
Title:Jelly Template Injection Vulnerability in ServiceNow UI Macros (CVE-2024-4879)
Description:ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible.
Description
Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability
Readme
# CVE-2024-4879
Bulk scanning tool for ServiceNow CVE-2024-4879 vulnerability.


![Banner](screens/screen.jpg)


## Overview

This tool is designed for bulk scanning of the ServiceNow CVE-2024-4879 vulnerability. It is inspired by [Assetnote](https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data) security research, which covers the recent ServiceNow CVE-2024-4879, CVE-2024-5178, and CVE-2024-5217 vulnerabilities in detail.

## How to Use

### Minimum Requirements

- Python 3.6 or higher
- `requests` library
  
### Single Target:
```sh
python CVE-2024-4879.py -u https://target:9090
```

### Bulk Sscan:
```sh
python CVE-2024-4879.py -f targets.txt
```

## Contact

For any suggestions or thoughts, please get in touch with [me](https://x.com/MohamedNab1l).


## Disclaimer

I like to create my own tools for fun, work and educational purposes only. I do not support or encourage hacking or unauthorized access to any system or network. Please use my tools responsibly and only on systems where you have clear permission to test.

## References

- https://www.assetnote.io/resources/research/chaining-three-bugs-to-access-all-your-servicenow-data
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4879
File Snapshot

[4.0K] /data/pocs/d91d1e2092a61ca2cfaa21a4aadc4e7fdc0e9858 ├── [5.3K] CVE-2024-4879.py ├── [1.2K] README.md └── [4.0K] screens └── [149K] screen.jpg 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →