Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.
Remediation
References
https://github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90
https://github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f
https://github.com/parse-community/parse-server/issues/8674
https://github.com/parse-community/parse-server/issues/8675
https://github.com/parse-community/parse-server/releases/tag/5.5.2
https://github.com/parse-community/parse-server/releases/tag/6.2.1
https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6
Related Vulnerabilities
CVE-2023-46131 Vulnerability in maven package org.grails:grails-web-common
CVE-2018-20676 Vulnerability in maven package org.webjars.bower:bootstrap-sass
CVE-2017-18214 Vulnerability in maven package org.webjars.bowergithub.moment:moment
CVE-2023-38698 Vulnerability in npm package @ensdomains/ens-contracts