Lucene search

K
githubGitHub Advisory DatabaseGHSA-6927-3VR9-FXF2
HistoryMar 01, 2024 - 8:08 p.m.

ZDI-CAN-19105: Parse Server literalizeRegexPart SQL Injection

2024-03-0120:08:23
CWE-89
GitHub Advisory Database
github.com
7
vulnerability
sql injection
parse server
postgresql
detection algorithm
patch
security advisory
release
coordination
trend micro zero day initiative
finder
developer
software

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

AI Score

8.1

Confidence

Low

EPSS

0

Percentile

15.5%

Impact

This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database.

Patches

The algorithm to detect SQL injection has been improved.

Workarounds

None.

References

Credits

  • Mikhail Shcherbakov (https://twitter.com/yu5k3) working with Trend Micro Zero Day Initiative (finder)
  • Ehsan Persania (remediation developer)
  • Manuel Trezza (coordinator)

Affected configurations

Vulners
Node
parseplatformparse_serverRange7.0.0-alpha.17.0.0-alpha.20
OR
parseplatformparse_serverRange<6.5.0
VendorProductVersionCPE
parseplatformparse_server*cpe:2.3:a:parseplatform:parse_server:*:*:*:*:*:*:*:*

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

AI Score

8.1

Confidence

Low

EPSS

0

Percentile

15.5%