parse-server@6.0.0-alpha.16 vulnerabilities

An express module providing a Parse-compatible API server

  • latest version

    7.4.0

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    1 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the parse-server package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Improper Authorization

    parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

    Affected versions of this package are vulnerable to Improper Authorization when the allowCustomObjectId is set to true, by setting a custom object ID for a new user that matches a specific role prefix.

    How to fix Improper Authorization?

    Upgrade parse-server to version 6.5.9, 7.3.0 or higher.

    <6.5.9>=7.0.0 <7.3.0
    • H
    SQL Injection

    parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

    Affected versions of this package are vulnerable to SQL Injection when Parse Server is configured to use the PostgreSQL database. An attacker can execute arbitrary SQL commands.

    How to fix SQL Injection?

    Upgrade parse-server to version 6.5.7, 7.1.0 or higher.

    <6.5.7>=7.0.0 <7.1.0
    • C
    Improper Input Validation

    parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

    Affected versions of this package are vulnerable to Improper Input Validation for Cloud Function names and Cloud Job names. Exploiting this vulnerability allows an attacker to cause a denial of service or execute arbitrary code by sending a specially crafted request.

    How to fix Improper Input Validation?

    Upgrade parse-server to version 6.5.5, 7.0.0-alpha.29 or higher.

    <6.5.5>=7.0.0-alpha.1 <7.0.0-alpha.29
    • C
    SQL Injection

    parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

    Affected versions of this package are vulnerable to SQL Injection via a malicious PostgreSQL statement containing multiple quoted strings. This vulnerability is only present when the PostgreSQL engine is in use.

    How to fix SQL Injection?

    Upgrade parse-server to version 6.5.0, 7.0.0-alpha.20 or higher.

    <6.5.0>=7.0.0-alpha.1 <7.0.0-alpha.20
    • C
    Prototype Pollution

    parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

    Affected versions of this package are vulnerable to Prototype Pollution in the MongoDB BSON parser, which allows attackers to execute code on the affected system.

    How to fix Prototype Pollution?

    Upgrade parse-server to version 5.5.2, 6.2.1 or higher.

    <5.5.2>=6.0.0-alpha.1 <6.2.1