CVE-2023-36475

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-36475
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-36475.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-36475
Aliases
Published
2023-06-28T22:32:10Z
Modified
2025-10-30T20:21:16.511836Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution
Details

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 5.5.2 and 6.2.1, an attacker can use a prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. A patch is available in versions 5.5.2 and 6.2.1.

Database specific
{
    "cwe_ids": [
        "CWE-1321"
    ]
}
References

Affected packages

Git / github.com/parse-community/parse-server

Affected ranges

Type
GIT
Repo
https://github.com/parse-community/parse-server
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "5.5.2"
        }
    ]
}
Type
GIT
Repo
https://github.com/parse-community/parse-server
Events
Database specific
{
    "versions": [
        {
            "introduced": "6.0.0"
        },
        {
            "fixed": "6.2.1"
        }
    ]
}

Affected versions

2.*

2.0.0
2.0.1
2.0.2
2.0.3
2.0.4
2.0.5
2.0.6
2.0.7
2.0.8
2.1.0
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.2.0
2.2.1
2.2.10
2.2.11
2.2.12
2.2.13
2.2.14
2.2.15
2.2.16
2.2.17
2.2.18
2.2.19
2.2.2
2.2.20
2.2.21
2.2.22
2.2.23
2.2.24
2.2.25
2.2.25-beta.1
2.2.3
2.2.4
2.2.5
2.2.6
2.2.7
2.2.8
2.2.9
2.3.1
2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8
2.4.0
2.4.1
2.4.2
2.5.0
2.5.1
2.5.2
2.5.3
2.6.0
2.6.1
2.6.2
2.6.3
2.6.4
2.6.5
2.7.0
2.7.1
2.7.2
2.7.3
2.7.4
2.8.0
2.8.2

3.*

3.0.0
3.1.0
3.1.1
3.1.2
3.1.3
3.10.0
3.2.0
3.2.1
3.2.2
3.2.3
3.3.0
3.4.0
3.4.1
3.5.0
3.6.0
3.7.0
3.7.1
3.7.2
3.8.0
3.9.0

4.*

4.0.0
4.0.1
4.0.2
4.1.0
4.2.0
4.3.0
4.4.0
4.5.0

5.*

5.0.0
5.0.0-alpha.1
5.0.0-alpha.10
5.0.0-alpha.11
5.0.0-alpha.12
5.0.0-alpha.13
5.0.0-alpha.14
5.0.0-alpha.15
5.0.0-alpha.16
5.0.0-alpha.17
5.0.0-alpha.18
5.0.0-alpha.19
5.0.0-alpha.2
5.0.0-alpha.20
5.0.0-alpha.21
5.0.0-alpha.22
5.0.0-alpha.23
5.0.0-alpha.24
5.0.0-alpha.25
5.0.0-alpha.26
5.0.0-alpha.27
5.0.0-alpha.28
5.0.0-alpha.29
5.0.0-alpha.3
5.0.0-alpha.4
5.0.0-alpha.5
5.0.0-alpha.6
5.0.0-alpha.7
5.0.0-alpha.8
5.0.0-alpha.9
5.0.0-beta.1
5.0.0-beta.10
5.0.0-beta.2
5.0.0-beta.3
5.0.0-beta.4
5.0.0-beta.5
5.0.0-beta.6
5.0.0-beta.7
5.0.0-beta.8
5.0.0-beta.9
5.1.0
5.1.1
5.2.0
5.2.0-alpha.1
5.2.0-alpha.2
5.2.0-alpha.3
5.2.0-beta.1
5.2.0-beta.2
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.2.7
5.2.8
5.3.0
5.3.0-alpha.10
5.3.0-alpha.11
5.3.0-alpha.12
5.3.0-alpha.13
5.3.0-alpha.14
5.3.0-alpha.15
5.3.0-alpha.16
5.3.0-alpha.17
5.3.0-alpha.18
5.3.0-alpha.19
5.3.0-alpha.20
5.3.0-alpha.21
5.3.0-alpha.22
5.3.0-alpha.23
5.3.0-alpha.24
5.3.0-alpha.25
5.3.0-alpha.26
5.3.0-alpha.27
5.3.0-alpha.28
5.3.0-alpha.29
5.3.0-alpha.30
5.3.0-alpha.31
5.3.0-alpha.32
5.3.0-alpha.7
5.3.0-alpha.8
5.3.0-alpha.9
5.3.0-beta.1
5.3.1
5.3.2
5.3.3
5.4.0
5.4.0-beta.1
5.4.1
5.4.2
5.4.3
5.5.0
5.5.1

6.*

6.0.0
6.0.0-alpha.31
6.0.0-alpha.32
6.0.0-alpha.33
6.0.0-alpha.34
6.0.0-alpha.35
6.1.0
6.1.0-alpha.1
6.1.0-alpha.2
6.1.0-alpha.3
6.1.0-alpha.4
6.1.0-alpha.5
6.1.0-alpha.6
6.1.0-alpha.7
6.1.0-alpha.8
6.1.0-beta.1
6.1.0-beta.2
6.2.0