A compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server requestKeywordDenylist option.
Improved keyword detection.
None.
Mikhail Shcherbakov, Cristian-Alexandru Staicu and Musard Balliu working with Trend Micro Zero Day Initiative
{
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2022-11-10T13:02:35Z",
"cwe_ids": [
"CWE-1321"
],
"nvd_published_at": "2022-11-10T21:15:00Z"
}