CVE-2024-47183

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role. This vulnerability is fixed in 6.5.9 and 7.3.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parseplatform:parse_server:*:*:*:*:*:*:*:*
cpe:2.3:a:parseplatform:parse_server:*:*:*:*:*:*:*:*

History

13 Nov 2024, 21:15

Type Values Removed Values Added
References () https://github.com/parse-community/parse-server/commit/13ee52f0d19ef3a3524b3d79aea100e587eb3cfc - () https://github.com/parse-community/parse-server/commit/13ee52f0d19ef3a3524b3d79aea100e587eb3cfc - Patch
References () https://github.com/parse-community/parse-server/commit/1bfbccf9ee7ea77533b2b2aa7c4c69f3bd35e66f - () https://github.com/parse-community/parse-server/commit/1bfbccf9ee7ea77533b2b2aa7c4c69f3bd35e66f - Patch
References () https://github.com/parse-community/parse-server/pull/9317 - () https://github.com/parse-community/parse-server/pull/9317 - Patch
References () https://github.com/parse-community/parse-server/pull/9318 - () https://github.com/parse-community/parse-server/pull/9318 - Patch
References () https://github.com/parse-community/parse-server/security/advisories/GHSA-8xq9-g7ch-35hg - () https://github.com/parse-community/parse-server/security/advisories/GHSA-8xq9-g7ch-35hg - Vendor Advisory
CPE cpe:2.3:a:parseplatform:parse_server:*:*:*:*:*:*:*:*
CWE CWE-863
First Time Parseplatform
Parseplatform parse Server

07 Oct 2024, 17:48

Type Values Removed Values Added
Summary
  • (es) Parse Server es un backend de código abierto que se puede implementar en cualquier infraestructura que pueda ejecutar Node.js. Si se configura la opción allowCustomObjectId: true de Parse Server, un atacante que tenga permiso para crear un nuevo usuario puede configurar un ID de objeto personalizado para ese nuevo usuario que aproveche la vulnerabilidad y adquiera privilegios de un rol específico. Esta vulnerabilidad se solucionó en 6.5.9 y 7.3.0.

04 Oct 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-04 15:15

Updated : 2024-11-13 21:15


NVD link : CVE-2024-47183

Mitre link : CVE-2024-47183

CVE.ORG link : CVE-2024-47183


JSON object : View

Products Affected

parseplatform

  • parse_server
CWE
CWE-863

Incorrect Authorization

CWE-285

Improper Authorization