{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-29027","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-03-14T16:59:47.611Z","datePublished":"2024-03-19T18:57:24.782Z","dateUpdated":"2024-08-02T14:42:21.433Z"},"containers":{"cna":{"title":"Parse Server crash and RCE via invalid Cloud Function or Cloud Job name","problemTypes":[{"descriptions":[{"cweId":"CWE-74","lang":"en","description":"CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/parse-community/parse-server/security/advisories/GHSA-6hh7-46r2-vf29","tags":["x_refsource_CONFIRM"],"url":"https://github.com/parse-community/parse-server/security/advisories/GHSA-6hh7-46r2-vf29"},{"name":"https://github.com/parse-community/parse-server/commit/5ae6d6a36d75c4511029f0ba5673ae4b2999179b","tags":["x_refsource_MISC"],"url":"https://github.com/parse-community/parse-server/commit/5ae6d6a36d75c4511029f0ba5673ae4b2999179b"},{"name":"https://github.com/parse-community/parse-server/commit/9f6e3429d3b326cf4e2994733c618d08032fac6e","tags":["x_refsource_MISC"],"url":"https://github.com/parse-community/parse-server/commit/9f6e3429d3b326cf4e2994733c618d08032fac6e"},{"name":"https://github.com/parse-community/parse-server/releases/tag/6.5.5","tags":["x_refsource_MISC"],"url":"https://github.com/parse-community/parse-server/releases/tag/6.5.5"},{"name":"https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29","tags":["x_refsource_MISC"],"url":"https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29"}],"affected":[{"vendor":"parse-community","product":"parse-server","versions":[{"version":"< 6.5.5","status":"affected"},{"version":">= 7.0.0-alpha.1, < 7.0.0-alpha.29","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-03-19T18:57:24.782Z"},"descriptions":[{"lang":"en","value":"Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 6.5.5 and 7.0.0-alpha.29, calling an invalid Parse Server Cloud Function name or Cloud Job name crashes the server and may allow for code injection, internal store manipulation or remote code execution. The patch in versions 6.5.5 and 7.0.0-alpha.29 added string sanitation for Cloud Function name and Cloud Job name. As a workaround, sanitize the Cloud Function name and Cloud Job name before it reaches Parse Server."}],"source":{"advisory":"GHSA-6hh7-46r2-vf29","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T01:03:51.581Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/parse-community/parse-server/security/advisories/GHSA-6hh7-46r2-vf29","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/parse-community/parse-server/security/advisories/GHSA-6hh7-46r2-vf29"},{"name":"https://github.com/parse-community/parse-server/commit/5ae6d6a36d75c4511029f0ba5673ae4b2999179b","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/parse-community/parse-server/commit/5ae6d6a36d75c4511029f0ba5673ae4b2999179b"},{"name":"https://github.com/parse-community/parse-server/commit/9f6e3429d3b326cf4e2994733c618d08032fac6e","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/parse-community/parse-server/commit/9f6e3429d3b326cf4e2994733c618d08032fac6e"},{"name":"https://github.com/parse-community/parse-server/releases/tag/6.5.5","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/parse-community/parse-server/releases/tag/6.5.5"},{"name":"https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29"}]},{"affected":[{"vendor":"parse_community","product":"parse_server","cpes":["cpe:2.3:a:parse_community:parse_server:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"6.5.5","versionType":"custom"},{"version":"7.0.0-alpha.1","status":"affected","lessThan":"7.0.0-alpha.29","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-03-20T14:37:25.176000Z","id":"CVE-2024-29027","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-02T14:42:21.433Z"}}]}}