CVE-2022-24760

Parse Server is an open source http web server backend. In versions prior to 4.10.7 there is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. Users are advised to upgrade as soon as possible. The only known workaround is to manually patch your installation with code referenced at the source GHSA-p6h4-93qp-jhcm.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
OR cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

01 Jul 2022, 16:06

Type Values Removed Values Added
References (MISC) https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/ - (MISC) https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/ - Exploit, Patch, Third Party Advisory

16 Apr 2022, 11:15

Type Values Removed Values Added
References
  • (MISC) https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/ -

20 Mar 2022, 00:09

Type Values Removed Values Added
References (MISC) https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d - (MISC) https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d - Patch, Third Party Advisory
References (CONFIRM) https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm - (CONFIRM) https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm - Exploit, Mitigation, Third Party Advisory
First Time Parseplatform
Microsoft windows
Microsoft
Canonical ubuntu Linux
Canonical
Parseplatform parse-server
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:*
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 10.0
CWE CWE-74 CWE-1321

12 Mar 2022, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-12 00:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-24760

Mitre link : CVE-2022-24760

CVE.ORG link : CVE-2022-24760


JSON object : View

Products Affected

parseplatform

  • parse-server

microsoft

  • windows

canonical

  • ubuntu_linux
CWE
CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')