CVE-2022-31112

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions parse Server LiveQuery does not remove protected fields in classes, passing them to the client. The LiveQueryController now removes protected fields from the client response. Users are advised to upgrade. Users unable t upgrade should use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*
cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 07:03

Type Values Removed Values Added
References () https://github.com/parse-community/parse-server/commit/309f64ced8700321df056fb3cc97f15007a00df1 - Patch, Third Party Advisory () https://github.com/parse-community/parse-server/commit/309f64ced8700321df056fb3cc97f15007a00df1 - Patch, Third Party Advisory
References () https://github.com/parse-community/parse-server/commit/9fd4516cde5c742f9f29dd05468b4a43a85639a6 - Patch, Third Party Advisory () https://github.com/parse-community/parse-server/commit/9fd4516cde5c742f9f29dd05468b4a43a85639a6 - Patch, Third Party Advisory
References () https://github.com/parse-community/parse-server/issues/8073 - Issue Tracking, Patch, Release Notes, Third Party Advisory () https://github.com/parse-community/parse-server/issues/8073 - Issue Tracking, Patch, Release Notes, Third Party Advisory
References () https://github.com/parse-community/parse-server/pull/8074 - Patch, Release Notes, Third Party Advisory () https://github.com/parse-community/parse-server/pull/8074 - Patch, Release Notes, Third Party Advisory
References () https://github.com/parse-community/parse-server/releases/tag/5.2.4 - Release Notes, Third Party Advisory () https://github.com/parse-community/parse-server/releases/tag/5.2.4 - Release Notes, Third Party Advisory
References () https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh - Third Party Advisory () https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh - Third Party Advisory

24 Jul 2023, 13:17

Type Values Removed Values Added
CWE CWE-200 CWE-212

Information

Published : 2022-06-30 17:15

Updated : 2024-11-21 07:03


NVD link : CVE-2022-31112

Mitre link : CVE-2022-31112

CVE.ORG link : CVE-2022-31112


JSON object : View

Products Affected

parseplatform

  • parse-server
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-212

Improper Removal of Sensitive Information Before Storage or Transfer