Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.
Remediation
References
https://github.com/parse-community/parse-server/issues/8675
https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6
https://github.com/parse-community/parse-server/releases/tag/6.2.1
https://github.com/parse-community/parse-server/releases/tag/5.5.2
https://github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f
https://github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90
https://github.com/parse-community/parse-server/issues/8674
Related Vulnerabilities
CVE-2019-10174 Vulnerability in maven package org.infinispan:infinispan-commons
CVE-2021-21165 Vulnerability in maven package org.webjars.npm:electron
CVE-2022-31183 Vulnerability in maven package co.fs2:fs2-io_sjs1_3
CVE-2020-36732 Vulnerability in maven package org.webjars.npm:crypto-js
CVE-2023-32993 Vulnerability in maven package io.jenkins.plugins:miniorange-saml-sp