CVE-2022-39313

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 4.10.17, and prior to 5.2.8 on the 5.x branch, crash when a file download request is received with an invalid byte range, resulting in a Denial of Service. This issue has been patched in versions 4.10.17, and 5.2.8. There are no known workarounds.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*

History

14 Jul 2023, 19:01

Type Values Removed Values Added
CWE CWE-20 CWE-1284

24 Oct 2022, 18:26

Type Values Removed Values Added
CWE CWE-20
References (CONFIRM) https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6qv-2wj3 - (CONFIRM) https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6qv-2wj3 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
First Time Parseplatform parse-server
Parseplatform

24 Oct 2022, 14:22

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-24 14:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-39313

Mitre link : CVE-2022-39313

CVE.ORG link : CVE-2022-39313


JSON object : View

Products Affected

parseplatform

  • parse-server
CWE
CWE-1284

Improper Validation of Specified Quantity in Input