ServiceNow’s ‘Simple List’: The Vulnerability Jeopardizing Thousands of Companies
A vulnerability has been detected on the digital business platform, ServiceNow, jeopardizing the platform’s users. ServiceNow is a cloud-based platform tailored for automating work processes within enterprises. It aids organizations in refining and optimizing service processes, incident management, modifications, and other IT services. Furthermore, it furnishes tools for task automation in various departments, such as HR, customer service, and security.
“DEVELOPING: A potential data exposure issue within ServiceNow’s built-in capability has been identified. This could allow unauthenticated users to extract data from records,” remarked Daniel Miessler in his statement on platform X.
According to a colleague quoted by Miessler, data such as names, email addresses, and internal documents might have been compromised, impacting “thousands of companies.”
Miessler believes the vulnerability to be an erroneous configuration in a ServiceNow component or widget named ‘Simple List,’ which arranges records into easily readable tables.
Moreover, this glitch has been present since the inception of the ‘Simple List’ component in 2015. As of now, Miessler states there’s no evidence suggesting malefactors exploited this vulnerability, though this doesn’t necessarily mean it hasn’t occurred.
“There’s been no evidence of exploitation in the wild. However, the potential for misuse has existed since 2015, which is the creation date of the component,” he added.
To rectify the issue, Miessler urgently advises organizations to implement internet protocol restrictions for incoming traffic, deactivate public widgets, or fortify their access control lists using a plugin.
It seems Miessler‘s assertion is rooted in a more comprehensive report by a cybersecurity researcher colleague, Aaron Costello, to which he alluded in his X thread.