CVE-2023-36475: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
(updated )
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.
References
- github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90
- github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f
- github.com/parse-community/parse-server/issues/8674
- github.com/parse-community/parse-server/issues/8675
- github.com/parse-community/parse-server/releases/tag/5.5.2
- github.com/parse-community/parse-server/releases/tag/6.2.1
- github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6
- nvd.nist.gov/vuln/detail/CVE-2023-36475
Detect and mitigate CVE-2023-36475 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →