CVE-2022-31112 – parse-server
Package
Manager: npm
Name: parse-server
Vulnerable Version: >=0 <4.10.13 || >=5.0.0 <5.2.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00565 pctl0.67461
Details
Protected fields exposed via LiveQuery ### Impact Parse Server LiveQuery does not remove protected fields in classes, passing them to the client. ### Patches The LiveQueryController now removes protected fields from the client response. ### Workarounds Use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields. ### References - https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh - https://github.com/parse-community/parse-server ### For more information If you have any questions or comments about this advisory: - For questions or comments about this vulnerability visit our [community forum](http://community.parseplatform.org/) or [community chat](http://chat.parseplatform.org/) - Report other vulnerabilities at [report.parseplatform.org](https://report.parseplatform.org/)
Metadata
Created: 2022-07-06T19:52:23Z
Modified: 2022-07-06T19:52:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/07/GHSA-crrq-vr9j-fxxh/GHSA-crrq-vr9j-fxxh.json
CWE IDs: ["CWE-200", "CWE-212"]
Alternative ID: GHSA-crrq-vr9j-fxxh
Finding: F310
Auto approve: 1