Show plain JSON{"id": "CVE-2022-42704", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.4, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.3}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.4, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.3}]}, "published": "2023-01-13T00:15:09.563", "references": [{"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1216141", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1216141", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "A cross-site scripting (XSS) vulnerability in Employee Service Center (esc) and Service Portal (sp) in ServiceNow Quebec, Rome, and San Diego allows remote attackers to inject arbitrary web script via the Standard Ticket Conversations widget."}, {"lang": "es", "value": "Una vulnerabilidad de cross-site scripting (XSS) en el Employee Service Center (esc) y Service Portal (sp) en ServiceNow Quebec, Roma y San Diego permite a atacantes remotos inyectar scripts web arbitrario a trav\u00e9s del widget Standard Ticket Conversations."}], "lastModified": "2025-04-09T14:15:25.053", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:servicenow:servicenow:quebec:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "412004C5-93F0-4EC0-B928-E6F41AB95FBE"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:rome:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "001789AB-E56B-4D04-B1B4-DD326A0CB1C9"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52C8A7D2-F930-4078-9E9D-E48782E46CBD"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAA82A56-93C2-47DC-92BA-D2EBF0C19EEC"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B053530E-1CB3-4A86-BD4B-569750776A53"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:rome:patch_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00EE16EE-B759-4BD8-A30B-C952142C860E"}, {"criteria": "cpe:2.3:a:servicenow:servicenow:san_diego:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0332F3A4-ABA4-4EE1-955C-C4B4B2B3C881"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}