ServiceNow admin credentials among hundreds of passwords exposed in cloud security blunder

Adam Bannister 22 February 2021 at 13:21 UTC
Updated: 22 February 2021 at 13:47 UTC

Vulnerability that could lead to full environment compromise has now been patched

ServiceNow admin credentials among hundreds of passwords exposed in cloud security blunder

More than 600 enterprises, universities, and government agencies may have inadvertently exposed their ServiceNow login credentials – many with administrator privileges – due to a vulnerability in the IT support platform.

Now patched, the security flaw centered on how the platform’s ‘Help the Help Desk’ feature requested information from endpoints and left unencrypted passwords publicly viewable on all ServiceNow instances that used the feature.

‘Entire environment compromise’

Gaining administrative access to a ServiceNow cloud instance would give an attacker free rein over customer support tickets, employee data, internal documentation, internal IT tickets, internal HR tickets, and other potentially sensitive customer information.

“Other ServiceNow features can even provide command execution on servers and workstations enrolled in various ServiceNow integrations,” said security researcher Jordan Potti in a blog post documenting his discovery.

RELATED ServiceDesk Plus vulnerability could give attackers full access to IT support systems

“Given the amount of information and access ServiceNow has in many environments, this can lead directly to entire environment compromise.”

Hinder the Help Desk

ServiceNow, a cloud computing platform used by enterprises to manage digital workflows, has more than 17,000 customers.

Enterprise users can configure the Help the Help Desk feature to collect information, via a WMI script, from the endpoints of employees and customers.

According to Potti, however, “the credentials for the request were stored in a public JavaScript file on all ServiceNow instances” that used the feature.

The file was readily accessible at https://<customername>.servicenow.com/HelpTheHelpDesk.jsdbx, and the credentials were visible “at the top of the script for anyone’s viewing pleasure”.

Worse still, the base64-encoded passwords were not encrypted, even if the prefix misleadingly indicated otherwise.

Potti added: “How this hadn’t been found before is interesting.”

Amplifying the risk

Many ServiceNow users exacerbated the security risk by using their administrator credentials when using SOAP [Simple Object Access Protocol] authentication for running the WMI script, overlooking the official documentation that outlines a process for creating an unprivileged role for the job.

Read more of the latest security vulnerability news

As a result, the researcher discovered numerous administrator-level usernames such as , , and among the exposed credentials.

“In more than one case, credentials provided full admin access to ServiceNow instances that were used by global companies with bug bounty programs,” noted Potti.

Simple to GET

The researcher said simple requests were sufficient to determine when a host was exposing credentials.

“Using some open source reconnaissance, a list of ServiceNow subdomains was collected and each one was issued a request for the HelpTheHelpDesk script,” he continued.

“If the and values were filled, the request was logged.”

The researcher unearthed the problem on August 15, 2020, and alerted ServiceNow on August 20.

The developers released a patch on October 8 and the vulnerability was publicly disclosed yesterday (February 21).

The Daily Swig has contacted ServiceNow and Jordan Potti for further comment. We will update the story if and when we receive replies.

YOU MIGHT ALSO LIKE Dependency confusion attack mounted via PyPi repo exposes flawed package installer behavior

Source

Next Post

Elon Musk: SpaceX Starlink satellite television broadband speeds will twin this year

Tue Feb 23 , 2021
SpaceX’s satellite television broadband assistance Starlink will certainly begin delivering download speeds of three hundred Mbps, or even double the very best speeds users can presently get upon the beta service, with some stage this season, according to the CEO Elon Musk. The particular Starlink beta is marketed as getting […]