First published: Thu Nov 10 2022(Updated: )
### Impact A compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server `requestKeywordDenylist` option. ### Patches Improved keyword detection. ### Workarounds None. ### Collaborators Mikhail Shcherbakov, Cristian-Alexandru Staicu and Musard Balliu working with Trend Micro Zero Day Initiative ### References - https://github.com/parse-community/parse-server/security/advisories/GHSA-93vw-8fm5-p2jf
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parseplatform Parse-server | <4.10.20 | |
Parseplatform Parse-server | >=5.0.0<5.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
A compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to bypass the Parse Server `requestKeywordDenylist` option using prototype pollution.
The vulnerability can be patched by implementing improved keyword detection in the affected software.
No, there are no known workarounds for this vulnerability.
CVE-2022-41879 has a severity rating of high (7.2).
Versions 4.10.20 (inclusive) to 5.3.3 (exclusive) of parse-server are affected by CVE-2022-41879.