HTTP: Parse Server literalizeRegexPart SQL Injection

This signature detects attempts to exploit a known vulnerability against Parse Server. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. A vulnerability in versions prior to 6.5.7 and 7.1.0 allows SQL injection when Parse Server is configured to use the PostgreSQL database. The algorithm to detect SQL injection has been improved in versions 6.5.7 and 7.1.0. No known workarounds are available.

Short Name
HTTP:SQL:INJ:PARSE-SR-LT-RX
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2024-27298 CVE-2024-39309 Injection Parse SQL Server literalizeRegexPart
Release Date
05/21/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3725
False Positive
Rarely

Found a potential security threat?