eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

242
active users

#ServiceNow

1 post1 participant0 posts today

#Visualpath offers the best #Servicenow Online Training with expert guidance and real-time project experience. We provide global training, including the USA, UK, Canada, Dubai, and Australia. Call +91-7032290546 for a free demo!
🌐 Visit: visualpath.in/servicenow-onlin
👉 WhatsApp: wa.me/c/917032290546
🌐 Visit Blog: servicenowonlinecrouse.blogspo

#software #trendingcourses #e_learning #dynamics #servicenow #it #skills #businesscentral #itsm #d #erp #workflow #e_learning #technology s

Récemment, des chercheurs ont découvert que plus de 1 000 instances ServiceNow étaient mal configurées, exposant des articles sensibles de leurs bases de connaissances (KB). Ces articles contiennent des informations critiques, comme des identifiants personnels (PII), des accès à des systèmes de production ou encore des procédures internes. Cette exposition provient principalement de contrôles d’accès mal appliqués, où les critères "User Criteria" permettent à des utilisateurs non authentifiés d’accéder aux articles via des widgets publics. Les identifiants des articles suivent un format prévisible (KBXXXXXXX), facilitant des attaques par force brute pour accéder aux données non sécurisées.
⬇️
"Thousands of orgs at risk of knowledge base data leaks via ServiceNow misconfigurations"
👇
theregister.com/2024/09/19/ser

"Enterprise ServiceNow Knowledge Bases at Risk: Extensive Data Exposures Uncovered"
👇
appomni.com/ao-labs/servicenow

"Can Just Anyone Access Your ServiceNow Articles?"
👇
adaptive-shield.com/blog/part-

The Register · Thousands of orgs at risk of knowledge base data leaks via ServiceNow misconfigurationsBy Connor Jones

Service Now - July 2024 vulnerabilities

CVE-2024-4879 doesn´t sound nice.

"ServiceNow has addressed an input validation vulnerability that was identified in Vancouver and Washington DC Now Platform releases. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform. ServiceNow applied an update to hosted instances, and ServiceNow released the update to our partners and self-hosted customers. Listed below are the patches and hot fixes that address the vulnerability. If you have not done so already, we recommend applying security patches relevant to your instance as soon as possible."

🔗 vulnerability.circl.lu/bundle/

vulnerability.circl.luBundle - ServiceNow - July 2024 vulnerabilitiesVulnerability Lookup - Fast vulnerability lookup correlation from different sources.