Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 5.3.3 or 4.10.20, a compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server `requestKeywordDenylist` option. This issue has been patched in versions 5.3.3 and 4.10.20. There are no known workarounds.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7291 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 5.3.3 or 4.10.20, a compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server `requestKeywordDenylist` option. This issue has been patched in versions 5.3.3 and 4.10.20. There are no known workarounds. |
Github GHSA |
GHSA-93vw-8fm5-p2jf | Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks |
References
History
Wed, 23 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T16:38:21.463Z
Reserved: 2022-09-30T00:00:00.000Z
Link: CVE-2022-41879
Updated: 2024-08-03T12:56:38.306Z
Status : Modified
Published: 2022-11-10T21:15:11.087
Modified: 2024-11-21T07:23:58.553
Link: CVE-2022-41879
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA