HTTP: Parse Server transformUpdate Prototype Pollution

This signature detects attempts to exploit a known vulnerability against Parse Server. A successful attack can result in a denial-of-service condition.

Extended Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 4.10.18, and prior to 5.3.1 on the 5.X branch, are vulnerable to Remote Code Execution via prototype pollution. An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. This issue is patched in version 5.3.1 and in 4.10.18. There are no known workarounds.

Affected Products

Parseplatform parse-server

References

CVE: CVE-2022-39396

Short Name
HTTP:CTS:PARSE-SERVER-DOS
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2022-39396 Parse Pollution Prototype Server transformUpdate
Release Date
10/09/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3693
False Positive
Rarely
Vendors

Parseplatform

Found a potential security threat?