CVE-2022-36079

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*

History

12 Sep 2022, 18:26

Type Values Removed Values Added
CPE cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
CWE CWE-200 NVD-CWE-noinfo
First Time Parseplatform
Parseplatform parse-server
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://github.com/parse-community/parse-server/releases/tag/4.10.14 - (MISC) https://github.com/parse-community/parse-server/releases/tag/4.10.14 - Release Notes, Third Party Advisory
References (CONFIRM) https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6 - (CONFIRM) https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6 - Third Party Advisory
References (MISC) https://github.com/parse-community/parse-server/releases/tag/5.2.5 - (MISC) https://github.com/parse-community/parse-server/releases/tag/5.2.5 - Release Notes, Third Party Advisory
References (MISC) https://github.com/parse-community/parse-server/issues/8144 - (MISC) https://github.com/parse-community/parse-server/issues/8144 - Issue Tracking, Third Party Advisory
References (MISC) https://github.com/parse-community/parse-server/issues/8143 - (MISC) https://github.com/parse-community/parse-server/issues/8143 - Issue Tracking, Third Party Advisory
References (MISC) https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4 - (MISC) https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4 - Patch, Third Party Advisory
References (MISC) https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec - (MISC) https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec - Patch, Third Party Advisory

07 Sep 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-07 21:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-36079

Mitre link : CVE-2022-36079

CVE.ORG link : CVE-2022-36079


JSON object : View

Products Affected

parseplatform

  • parse-server
CWE
NVD-CWE-noinfo CWE-200

Exposure of Sensitive Information to an Unauthorized Actor