parse-server@6.3.0 vulnerabilities

An express module providing a Parse-compatible API server

Direct Vulnerabilities

Known vulnerabilities in the parse-server package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Improper Input Validation

parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

Affected versions of this package are vulnerable to Improper Input Validation for Cloud Function names and Cloud Job names. Exploiting this vulnerability allows an attacker to cause a denial of service or execute arbitrary code by sending a specially crafted request.

How to fix Improper Input Validation?

Upgrade parse-server to version 6.5.5, 7.0.0-alpha.29 or higher.

<6.5.5 >=7.0.0-alpha.1 <7.0.0-alpha.29
  • C
SQL Injection

parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

Affected versions of this package are vulnerable to SQL Injection via a malicious PostgreSQL statement containing multiple quoted strings. This vulnerability is only present when the PostgreSQL engine is in use.

How to fix SQL Injection?

Upgrade parse-server to version 6.5.0, 7.0.0-alpha.20 or higher.

<6.5.0 >=7.0.0-alpha.1 <7.0.0-alpha.20
  • H
Uncontrolled Resource Consumption ('Resource Exhaustion')

parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') via the file upload function. An attacker can cause the server to crash by uploading a file without an extension.

How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')?

Upgrade parse-server to version 5.5.6, 6.3.1 or higher.

>=1.0.0 <5.5.6 >=6.0.0 <6.3.1