parseplatform parse-server 信息暴露

admin 2023-11-30 06:07:37 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 parseplatform parse-server 信息暴露

CVE编号

CVE-2022-36079

利用情况

暂无

补丁情况

官方补丁

披露时间

2022-09-08
漏洞描述
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fa...
https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983...
https://github.com/parse-community/parse-server/issues/8143
https://github.com/parse-community/parse-server/issues/8144
https://github.com/parse-community/parse-server/releases/tag/4.10.14
https://github.com/parse-community/parse-server/releases/tag/5.2.5
https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 parseplatform parse-server * Up to (excluding) 4.10.14
运行在以下环境
应用 parseplatform parse-server * From (including) 5.0.0 Up to (excluding) 5.2.5
阿里云评分 6.2
  • 攻击路径 本地
  • 攻击复杂度 复杂
  • 权限要求 普通权限
  • 影响范围 越权影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-200 信息暴露
NVD-CWE-noinfo
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0