Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.
Remediation
References
https://github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90
https://github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f
https://github.com/parse-community/parse-server/issues/8674
https://github.com/parse-community/parse-server/issues/8675
https://github.com/parse-community/parse-server/releases/tag/5.5.2
https://github.com/parse-community/parse-server/releases/tag/6.2.1
https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6
Related Vulnerabilities
CVE-2013-0239 Vulnerability in maven package org.apache.cxf:cxf-bundle
CVE-2020-15250 Vulnerability in maven package junit:junit
CVE-2016-0788 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2021-21414 Vulnerability in npm package @prisma/sdk
CVE-2018-14721 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind