Lucene search

K
cveGitHub_MCVE-2022-31089
HistoryJun 27, 2022 - 9:15 p.m.

CVE-2022-31089

2022-06-2721:15:08
CWE-252
CWE-706
GitHub_M
web.nvd.nist.gov
67
6
cve
2022
31089
parse server
node.js
remote attack
server crash
upgrade
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

39.2%

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions certain types of invalid files requests are not handled properly and can crash the server. If you are running multiple Parse Server instances in a cluster, the availability impact may be low; if you are running Parse Server as single instance without redundancy, the availability impact may be high. This issue has been addressed in versions 4.10.12 and 5.2.3. Users are advised to upgrade. There are no known workarounds for this issue.

Affected configurations

Nvd
Vulners
Node
parseplatformparse-serverRange<4.10.12node.js
OR
parseplatformparse-serverRange5.0.05.2.3node.js
VendorProductVersionCPE
parseplatformparse-server*cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*

CNA Affected

[
  {
    "product": "parse-server",
    "vendor": "parse-community",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.10.12"
      },
      {
        "status": "affected",
        "version": ">=5.0.0, < 5.2.3"
      }
    ]
  }
]

Social References

More

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

39.2%