// For flags

CVE-2024-39309

ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.

Parse Server es un backend de código abierto que se puede implementar en cualquier infraestructura que pueda ejecutar Node.js. Una vulnerabilidad en versiones anteriores a 6.5.7 y 7.1.0 permite la inyección de SQL cuando Parse Server está configurado para usar la base de datos PostgreSQL. El algoritmo para detectar inyección SQL ha sido mejorado en las versiones 6.5.7 y 7.1.0. No hay workarounds disponibles.

This vulnerability allows remote attackers to bypass authentication on affected installations of Parse Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the literalizeRegexPart function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to bypass authentication on the system.

*Credits: Smile Thanapattheerakul of Trend Micro Research
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-06-21 CVE Reserved
  • 2024-07-01 CVE Published
  • 2024-07-02 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
  • CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Parse-community
Search vendor "Parse-community"
Parse-server
Search vendor "Parse-community" for product "Parse-server"
< 6.5.7
Search vendor "Parse-community" for product "Parse-server" and version " < 6.5.7"
en
Affected
Parse-community
Search vendor "Parse-community"
Parse-server
Search vendor "Parse-community" for product "Parse-server"
>= 7.0.0 < 7.1.0
Search vendor "Parse-community" for product "Parse-server" and version " >= 7.0.0 < 7.1.0"
en
Affected