Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xprv-wvh7-qqqx

Опубликовано: 09 нояб. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.2

Описание

Parse Server vulnerable to Prototype Pollution via Cloud Code Webhooks or Cloud Code Triggers

Impact

Keywords that are specified in the Parse Server option requestKeywordDenylist can be injected via Cloud Code Webhooks or Triggers. This will result in the keyword being saved to the database, bypassing the requestKeywordDenylist option.

Patches

Improved keyword detection.

Workarounds

Configure your firewall to only allow trusted servers to make request to the Parse Server Cloud Code Webhooks API, or block the API completely if you are not using the feature.

Collaborators

Mikhail Shcherbakov, Cristian-Alexandru Staicu and Musard Balliu working with Trend Micro Zero Day Initiative

References

Пакеты

Наименование

parse-server

npm
Затронутые версииВерсия исправления

< 4.10.19

4.10.19

Наименование

parse-server

npm
Затронутые версииВерсия исправления

>= 5.0.0, < 5.3.2

5.3.2

EPSS

Процентиль: 66%
0.00514
Низкий

7.2 High

CVSS3

Дефекты

CWE-1321

Связанные уязвимости

CVSS3: 7.2
nvd
около 3 лет назад

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 5.3.2 or 4.10.19, keywords that are specified in the Parse Server option `requestKeywordDenylist` can be injected via Cloud Code Webhooks or Triggers. This will result in the keyword being saved to the database, bypassing the `requestKeywordDenylist` option. This issue is fixed in versions 4.10.19, and 5.3.2. If upgrade is not possible, the following Workarounds may be applied: Configure your firewall to only allow trusted servers to make request to the Parse Server Cloud Code Webhooks API, or block the API completely if you are not using the feature.

EPSS

Процентиль: 66%
0.00514
Низкий

7.2 High

CVSS3

Дефекты

CWE-1321