Unsafe Dependency Resolution Affecting parse-server package, versions >=4.6.0 <4.10.0 >=4.0.3 <4.1.0 >=4.0.0-beta1 <4.0.2


Severity

0.0
high
0
10

    Threat Intelligence

    Exploit Maturity
    Proof of concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-PARSESERVER-1583451
  • published 8 Sep 2021
  • disclosed 7 Sep 2021
  • credit Unknown

How to fix?

Upgrade parse-server to version 4.10.0, 4.1.0, 4.0.2 or higher.

Overview

parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

Affected versions of this package are vulnerable to Unsafe Dependency Resolution. A security incident caused a number of incorrect version tags to be pushed to the Parse Server repository. These version tags linked to a personal fork of a contributor who had write access to the repository. The code to which these tags linked has not been reviewed or approved by Parse Platform. Even though no releases were published with these incorrect versions, it was possible to define a Parse Server dependency that pointed to these version tags. Example:

"parse-server": "git@github.com:parse-community/parse-server.git#4.9.3"

CVSS Scores

version 3.1
Expand this section

Snyk

8.6 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    Low
  • Availability (A)
    Low