CVE-2022-41879: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
(updated )
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 5.3.3 or 4.10.20, a compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server requestKeywordDenylist
option. This issue has been patched in versions 5.3.3 and 4.10.20. There are no known workarounds.
References
- github.com/advisories/GHSA-93vw-8fm5-p2jf
- github.com/parse-community/parse-server/commit/60c5a73d257e0d536056b38bdafef8b7130524d8
- github.com/parse-community/parse-server/commit/6c63f04ba37174021082a5b5c4ba1556dcc954f4
- github.com/parse-community/parse-server/pull/8305
- github.com/parse-community/parse-server/pull/8306
- github.com/parse-community/parse-server/releases/tag/4.10.20
- github.com/parse-community/parse-server/releases/tag/5.3.3
- github.com/parse-community/parse-server/security/advisories/GHSA-93vw-8fm5-p2jf
- nvd.nist.gov/vuln/detail/CVE-2022-41879
Detect and mitigate CVE-2022-41879 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →