Remote code execution via MongoDB BSON parser through prototype pollution
- Severity:
- High
Description
An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser.
Recommendation
Update the parse-server package to the latest compatible version. Followings are version details:
Affected version(s): **>= 5.0.0, < 5.3.1 < 4.10.18** Patched version(s): **5.3.1 4.10.18**
References
Related Issues
- Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks - CVE-2022-41879
- Volto affected by possible DoS by invoking specific URL by anonymous user - CVE-2025-58047
- Parse Server before v3.4.1 vulnerable to Denial of Service - CVE-2019-1020012
- Elliptic's ECDSA missing check for whether leading bit of r and s is zero - CVE-2024-42460
- Tags:
- npm
- parse-server
Anything's wrong? Let us know Last updated on August 21, 2023