CVE-2024-27298: ZDI-CAN-19105: Parse Server literalizeRegexPart SQL Injection
Impact
This vulnerability allows SQL injection when Parse Server is configured to use the PostgreSQL database.
Patches
The algorithm to detect SQL injection has been improved.
Workarounds
None.
References
- https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
- https://github.com/parse-community/parse-server/releases/tag/6.5.0 (fixed in Parse Server 6)
- https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20 (fixed in Parse Server 7 alpha release)
Credits
- Mikhail Shcherbakov (https://twitter.com/yu5k3) working with Trend Micro Zero Day Initiative (finder)
- Ehsan Persania (remediation developer)
- Manuel Trezza (coordinator)
References
- github.com/advisories/GHSA-6927-3vr9-fxf2
- github.com/parse-community/parse-server
- github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504
- github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833
- github.com/parse-community/parse-server/releases/tag/6.5.0
- github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20
- github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2
- nvd.nist.gov/vuln/detail/CVE-2024-27298
Detect and mitigate CVE-2024-27298 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →