Description
Parse Javascript SDK provides access to the powerful Parse Server backend from your JavaScript app. Prior to 7.0.0, injection of malicious payload allows attacker to remotely execute arbitrary code. ParseObject.fromJSON, ParseObject.pin, ParseObject.registerSubclass, ObjectStateMutations (internal), and encode/decode (internal) are affected. This vulnerability is fixed in 7.0.0.
Problem types
CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Product status
References
github.com/...SDK-JS/security/advisories/GHSA-9f2h-7v79-mxw3
github.com/parse-community/Parse-SDK-JS/pull/2749
github.com/...ommit/00973987f361368659c0c4dbf669f3897520b132
github.com/...munity/Parse-SDK-JS/releases/tag/7.0.0-alpha.1