Lucene search

K
githubGitHub Advisory DatabaseGHSA-C2HR-CQG6-8J6R
HistoryJul 01, 2024 - 6:35 p.m.

ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability

2024-07-0118:35:04
CWE-288
GitHub Advisory Database
github.com
3
parse server
sql injection
postgresql
vulnerability
security patch
github advisory
trend micro
manuel trezza

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

Impact

This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database.

Patches

The algorithm to detect SQL injection has been improved.

Workarounds

None.

References

Credits

  • Smile Thanapattheerakul of Trend Micro (finder)
  • Manuel Trezza (coordinator)

Affected configurations

Vulners
Node
parseserverRange<7.1.0
OR
parseserverRange<6.5.7
CPENameOperatorVersion
parse-serverlt7.1.0
parse-serverlt6.5.7

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

Related for GHSA-C2HR-CQG6-8J6R