Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 6.5.5 and 7.0.0-alpha.29, calling an invalid Parse Server Cloud Function name or Cloud Job name crashes the server and may allow for code injection, internal store manipulation or remote code execution. The patch in versions 6.5.5 and 7.0.0-alpha.29 added string sanitation for Cloud Function name and Cloud Job name. As a workaround, sanitize the Cloud Function name and Cloud Job name before it reaches Parse Server.
References
Configurations
No configuration.
History
21 Nov 2024, 09:07
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/parse-community/parse-server/commit/5ae6d6a36d75c4511029f0ba5673ae4b2999179b - | |
References | () https://github.com/parse-community/parse-server/commit/9f6e3429d3b326cf4e2994733c618d08032fac6e - | |
References | () https://github.com/parse-community/parse-server/releases/tag/6.5.5 - | |
References | () https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29 - | |
References | () https://github.com/parse-community/parse-server/security/advisories/GHSA-6hh7-46r2-vf29 - |
19 Mar 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-19 19:15
Updated : 2024-11-21 09:07
NVD link : CVE-2024-29027
Mitre link : CVE-2024-29027
CVE.ORG link : CVE-2024-29027
JSON object : View
Products Affected
No product.
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')