Feb. 4, 2022, midnight |

SpiderLabs Blog from Trustwave www.trustwave.com

During a recent engagement, Trustwave SpiderLabs discovered a vulnerability (CVE-2021-45901) within ServiceNow (Orlando) which allows for a successful username enumeration by using a wordlist. By using an unauthenticated session and navigating to the password reset form, it is possible to infer a valid username. This is achieved through examination of the HTTP POST response data initially triggered by the password reset web form. This response differs depending on a username's existence.

cve enumeration servicenow username username enumeration vulnerability

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant/Senior Consultant – Categoria Protetta L. 68/99

@ BIP | Italy

SoC Security Architect, Platform Architecture

@ Apple | San Diego, California, United States

Cloud Engineer II- SOC Analyst

@ Insight Enterprises, Inc. | Gurugram Gurgaon HR, IN