Lucene search

K
githubGitHub Advisory DatabaseGHSA-93VW-8FM5-P2JF
HistoryNov 10, 2022 - 1:02 p.m.

Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks

2022-11-1013:02:35
CWE-1321
GitHub Advisory Database
github.com
12
parse server
prototype pollution
cloud code
webhooks
impact
`requestkeyworddenylist`
patches
improved keyword detection
vulnerability
endpoint
attacker
parse-community
security advisory

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.7%

Impact

A compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server requestKeywordDenylist option.

Patches

Improved keyword detection.

Workarounds

None.

Collaborators

Mikhail Shcherbakov, Cristian-Alexandru Staicu and Musard Balliu working with Trend Micro Zero Day Initiative

References

Affected configurations

Vulners
Node
parseserverRange<5.3.3
OR
parseserverRange<4.10.20
CPENameOperatorVersion
parse-serverlt5.3.3
parse-serverlt4.10.20

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

59.7%

Related for GHSA-93VW-8FM5-P2JF