First published: Tue Oct 18 2022(Updated: )
### Impact Parse Server crashes when a file download request is received with an invalid byte range. ### Patches Improved parsing of the range parameter to properly handle invalid range requests. ### Workarounds None ### References - [GHSA-h423-w6qv-2wj3](https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6qv-2wj3)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/parse-server | >=5.0.0<5.2.8 | 5.2.8 |
npm/parse-server | <4.10.17 | 4.10.17 |
Parseplatform Parse-server | <4.10.17 | |
Parseplatform Parse-server | >=5.0.0<5.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-39313.
The vulnerability can cause Parse Server to crash, resulting in a Denial of Service.
Versions prior to 4.10.17 and prior to 5.2.8 on the 5.x branch are affected.
The vulnerability can be exploited by sending a file download request with an invalid byte range.
The severity of CVE-2022-39313 is high, with a CVSS score of 7.5.