We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47183

Parse Server's custom object ID allows to acquire role privileges



Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role. This vulnerability is fixed in 6.5.9 and 7.3.0.

Reserved 2024-09-19 | Published 2024-10-04 | Updated 2024-10-04 | Assigner GitHub_M


HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-285: Improper Authorization

Product status

< 6.5.9
affected

>= 7.0.0, < 7.3.0
affected

References

github.com/...server/security/advisories/GHSA-8xq9-g7ch-35hg

github.com/parse-community/parse-server/pull/9317

github.com/parse-community/parse-server/pull/9318

github.com/...ommit/13ee52f0d19ef3a3524b3d79aea100e587eb3cfc

github.com/...ommit/1bfbccf9ee7ea77533b2b2aa7c4c69f3bd35e66f

cve.org (CVE-2024-47183)

nvd.nist.gov (CVE-2024-47183)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47183

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.