Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-41058 |
CWE-ID | CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Parse Server Web applications / Modules and components for CMS |
Vendor | Parse Community |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU80441
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-41058
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in Parse Pointer. A remote non-authenticated attacker can access internal Parse Server classes and circumvent beforeFind
query trigger to bypass implemented security restrictions and gain unauthorized access to the application.
Install updates from vendor's website.
Vulnerable software versionsParse Server: 1.0.0 - 6.2.1
CPE2.3https://github.com/parse-community/parse-server/commit/be4c7e23c63a2fb690685665cebed0de26be05c5
https://github.com/parse-community/parse-server/releases/tag/6.2.2
https://github.com/parse-community/parse-server/security/advisories/GHSA-fcv6-fg5r-jm9q
https://github.com/parse-community/parse-server/releases/tag/5.5.5
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.