8.2
CWE
200 212
Advisory Published
Advisory Published
Updated

CVE-2022-31112: Protected fields exposed via LiveQuery in parse-server

First published: Thu Jun 30 2022(Updated: )

### Impact Parse Server LiveQuery does not remove protected fields in classes, passing them to the client. ### Patches The LiveQueryController now removes protected fields from the client response. ### Workarounds Use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields. ### References - https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh - https://github.com/parse-community/parse-server ### For more information If you have any questions or comments about this advisory: - For questions or comments about this vulnerability visit our [community forum](http://community.parseplatform.org/) or [community chat](http://chat.parseplatform.org/) - Report other vulnerabilities at [report.parseplatform.org](https://report.parseplatform.org/)

Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
npm/parse-server>=5.0.0<5.2.4
5.2.4
npm/parse-server<4.10.13
4.10.13
Parseplatform Parse-server<4.10.13
Parseplatform Parse-server>=5.0.0<5.2.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-31112?

    CVE-2022-31112 is a vulnerability in Parse Server where protected fields in classes are not removed in Parse Server LiveQuery responses.

  • How does CVE-2022-31112 impact Parse Server?

    CVE-2022-31112 allows protected fields in classes to be passed to the client in Parse Server LiveQuery.

  • What is the severity of CVE-2022-31112?

    The severity of CVE-2022-31112 is high, with a CVSS score of 8.2.

  • How can I fix CVE-2022-31112 in Parse Server?

    You can fix CVE-2022-31112 in Parse Server by upgrading to version 5.2.4 or later.

  • Are there any workarounds for CVE-2022-31112?

    Yes, you can use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields as a workaround for CVE-2022-31112.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203