First published: Wed Sep 07 2022(Updated: )
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parseplatform Parse-server | <4.10.14 | |
Parseplatform Parse-server | >=5.0.0<5.2.5 |
https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec
https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36079 is a vulnerability in Parse Server, an open source backend that can be deployed to any infrastructure that can run Node.js.
CVE-2022-36079 allows an attacker to use internal and protected fields as query constraints in Parse Server, potentially causing unauthorized data access.
Parse Server versions up to 4.10.14 and versions between 5.0.0 and 5.2.5 are affected by CVE-2022-36079.
CVE-2022-36079 has a severity rating of 7.5 (high).
To fix CVE-2022-36079, update Parse Server to a version higher than 5.2.5 or apply the fixes mentioned in the provided GitHub commits.