SB2023062920 - Prototype pollution in Parse Server
Published: June 29, 2023 Updated: August 25, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Prototype pollution (CVE-ID: CVE-2023-36475)
The vulnerability allows a remote attacker to execute arbitrary JavaScript code.
The vulnerability exists due to improper input validation within the MongoDB BSON parser. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation or lead to code execution.
Remediation
Install update from vendor's website.
References
- https://github.com/parse-community/parse-server/issues/8675
- https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6
- https://github.com/parse-community/parse-server/releases/tag/6.2.1
- https://github.com/parse-community/parse-server/releases/tag/5.5.2
- https://github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f
- https://github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90
- https://github.com/parse-community/parse-server/issues/8674
- https://github.com/advisories/GHSA-prm5-8g2m-24gg
- https://www.zerodayinitiative.com/advisories/ZDI-23-1160/