CVE-2024-39309
ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.
Parse Server es un backend de código abierto que se puede implementar en cualquier infraestructura que pueda ejecutar Node.js. Una vulnerabilidad en versiones anteriores a 6.5.7 y 7.1.0 permite la inyección de SQL cuando Parse Server está configurado para usar la base de datos PostgreSQL. El algoritmo para detectar inyección SQL ha sido mejorado en las versiones 6.5.7 y 7.1.0. No hay workarounds disponibles.
This vulnerability allows remote attackers to bypass authentication on affected installations of Parse Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the literalizeRegexPart function. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to bypass authentication on the system.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-06-21 CVE Reserved
- 2024-07-01 CVE Published
- 2024-07-02 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/parse-community/parse-server/commit/2edf1e4c0363af01e97a7fbc97694f851b7d1ff3 | X_refsource_misc | |
https://github.com/parse-community/parse-server/commit/f332d54577608c5ad927255e06d8c694e2e0ff5b | X_refsource_misc | |
https://github.com/parse-community/parse-server/pull/9167 | X_refsource_misc | |
https://github.com/parse-community/parse-server/pull/9168 | X_refsource_misc | |
https://github.com/parse-community/parse-server/security/advisories/GHSA-c2hr-cqg6-8j6r | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Parse-community Search vendor "Parse-community" | Parse-server Search vendor "Parse-community" for product "Parse-server" | < 6.5.7 Search vendor "Parse-community" for product "Parse-server" and version " < 6.5.7" | en |
Affected
| ||||||
Parse-community Search vendor "Parse-community" | Parse-server Search vendor "Parse-community" for product "Parse-server" | >= 7.0.0 < 7.1.0 Search vendor "Parse-community" for product "Parse-server" and version " >= 7.0.0 < 7.1.0" | en |
Affected
|