Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-c2hr-cqg6-8j6r: ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability

Impact

This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database.

Patches

The algorithm to detect SQL injection has been improved.

Workarounds

None.

References

  • https://github.com/parse-community/parse-server/security/advisories/GHSA-c2hr-cqg6-8j6r
  • https://github.com/parse-community/parse-server/pull/9167 (fix for Parse Server 7)
  • https://github.com/parse-community/parse-server/pull/9168 (fix for Parse Server 6)

Credits

  • Smile Thanapattheerakul of Trend Micro (finder)
  • Manuel Trezza (coordinator)
ghsa
#sql#vulnerability#web#nodejs#git#auth#postgres

Skip to content

Navigation Menu

Sign in

CVE-2024-39309

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • GitHub Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

Explore

*   All features
*   Documentation
*   GitHub Skills
*   Blog
  • By size

    • Enterprise
    • Teams
    • Startups

    By industry

    • Healthcare
    • Financial services
    • Manufacturing

    By use case

    • CI/CD & Automation
    • DevOps
    • DevSecOps
  • Resources

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

Repositories

*   Topics
*   Trending
*   Collections
    • Enterprise platform

      AI-powered developer platform

Available add-ons

*   Advanced Security
    
    Enterprise-grade security features
    
*   GitHub Copilot
    
    Enterprise-grade AI features
    
*   Premium Support
    
    Enterprise-grade 24/7 support
  • Pricing

Search code, repositories, users, issues, pull requests…

Provide feedback

We read every piece of feedback, and take your input very seriously.

Include my email address so I can be contacted

Saved searches****Use saved searches to filter your results more quickly

Sign in

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-39309

ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability

Critical severity GitHub Reviewed Published Jun 30, 2024 in parse-community/parse-server • Updated Jul 1, 2024

Vulnerability details Dependabot alerts 0

Package

npm parse-server (npm)

Affected versions

< 6.5.7

>= 7.0.0, < 7.1.0

Patched versions

6.5.7

7.1.0

Description

Impact

This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database.

Patches

The algorithm to detect SQL injection has been improved.

Workarounds

None.

References

  • GHSA-c2hr-cqg6-8j6r
  • parse-community/parse-server#9167 (fix for Parse Server 7)
  • parse-community/parse-server#9168 (fix for Parse Server 6)

Credits

  • Smile Thanapattheerakul of Trend Micro (finder)
  • Manuel Trezza (coordinator)

References

  • GHSA-c2hr-cqg6-8j6r
  • parse-community/parse-server#9167
  • parse-community/parse-server#9168

mtrezza published to parse-community/parse-server

Jun 30, 2024

Published to the GitHub Advisory Database

Jul 1, 2024

Reviewed

Jul 1, 2024

Last updated

Jul 1, 2024

Severity

Critical

9.8

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

None

User interaction

None

Scope

Unchanged

Confidentiality

High

Integrity

High

Availability

High

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CWE-288

CVE ID

CVE-2024-39309

GHSA ID

GHSA-c2hr-cqg6-8j6r

Source code

parse-community/parse-server

Credits

  • mtrezza Coordinator

Loading Checking history

See something to contribute? Suggest improvements for this vulnerability.

ghsa: Latest News

GHSA-pj33-75x5-32j4: RabbitMQ HTTP API's queue deletion endpoint does not verify that the user has a required permission