Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-2315 Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.
Github GHSA Github GHSA GHSA-c2hr-cqg6-8j6r ZDI-CAN-23894: Parse Server literalizeRegexPart SQL Injection Authentication Bypass Vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T04:19:20.712Z

Reserved: 2024-06-21T18:15:22.260Z

Link: CVE-2024-39309

cve-icon Vulnrichment

Updated: 2024-07-02T17:32:32.129Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-01T22:15:03.253

Modified: 2024-11-21T09:27:25.990

Link: CVE-2024-39309

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.