Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6666 | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints. |
Github GHSA |
GHSA-2m6g-crv8-p3c6 | Parse Server vulnerable to brute force guessing of user sensitive data via search patterns |
Wed, 23 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T17:13:55.464Z
Reserved: 2022-07-15T00:00:00.000Z
Link: CVE-2022-36079
Updated: 2024-08-03T09:52:00.466Z
Status : Modified
Published: 2022-09-07T21:15:08.560
Modified: 2024-11-21T07:12:20.153
Link: CVE-2022-36079
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA