Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.
Remediation
References
https://github.com/parse-community/parse-server/issues/8675
https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6
https://github.com/parse-community/parse-server/releases/tag/6.2.1
https://github.com/parse-community/parse-server/releases/tag/5.5.2
https://github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f
https://github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90
https://github.com/parse-community/parse-server/issues/8674
Related Vulnerabilities
CVE-2021-28170 Vulnerability in maven package org.glassfish:jakarta.el
CVE-2022-25912 Vulnerability in npm package simple-git
CVE-2023-46998 Vulnerability in maven package org.webjars.npm:bootbox.js
CVE-2022-0087 Vulnerability in npm package @keystone-6/auth
CVE-2023-48241 Vulnerability in maven package org.xwiki.platform:xwiki-platform-search-solr-query