Products
Parse Server
- 6.5.9
- 7.3.0
Source
security-advisories@github.com
Tags
CVE-2024-47183 details
Published : Oct. 4, 2024, 3:15 p.m.
Last Modified : Oct. 4, 2024, 3:15 p.m.
Last Modified : Oct. 4, 2024, 3:15 p.m.
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role. This vulnerability is fixed in 6.5.9 and 7.3.0.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8.1 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-285 | Improper Authorization | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
Base Score
8.1
Exploitability Score
2.8
Impact Score
5.2
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
References
URL | Source |
---|---|
https://github.com/parse-community/parse-server/commit/13ee52f0d19ef3a3524b3d79aea100e587eb3cfc | security-advisories@github.com |
https://github.com/parse-community/parse-server/commit/1bfbccf9ee7ea77533b2b2aa7c4c69f3bd35e66f | security-advisories@github.com |
https://github.com/parse-community/parse-server/pull/9317 | security-advisories@github.com |
https://github.com/parse-community/parse-server/pull/9318 | security-advisories@github.com |
https://github.com/parse-community/parse-server/security/advisories/GHSA-8xq9-g7ch-35hg | security-advisories@github.com |
This website uses the NVD API, but is not approved or certified by it.