CVE-2023-36475: Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution

9.8 CVSS

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.

Classification

CVE ID: CVE-2023-36475

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.8

Affected Products

Vendor: parse-community

Product: parse-server

Exploit Prediction Scoring System (EPSS)

EPSS Score: 14.4% (probability of being exploited)

EPSS Percentile: 95.77% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6
https://github.com/parse-community/parse-server/issues/8674
https://github.com/parse-community/parse-server/issues/8675
https://github.com/parse-community/parse-server/commit/3dd99dd80e27e5e1d99b42844180546d90c7aa90
https://github.com/parse-community/parse-server/commit/5fad2928fb8ee17304abcdcf259932f827d8c81f
https://github.com/parse-community/parse-server/releases/tag/5.5.2
https://github.com/parse-community/parse-server/releases/tag/6.2.1

Timeline