Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution
Critical severity
GitHub Reviewed
Published
Jun 28, 2023
in
parse-community/parse-server
•
Updated Nov 6, 2023
Description
Published by the National Vulnerability Database
Jun 28, 2023
Published to the GitHub Advisory Database
Jun 30, 2023
Reviewed
Jun 30, 2023
Last updated
Nov 6, 2023
Impact
An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser.
Patches
Prevent prototype pollution in MongoDB database adapter.
Workarounds
Disable remote code execution through the MongoDB BSON parser.
Credits
References
References