Vulnerability Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 4.10.17, and prior to 5.2.8 on the 5.x branch, crash when a file download request is received with an invalid byte range, resulting in a Denial of Service. This issue has been patched in versions 4.10.17, and 5.2.8. There are no known workarounds.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Parseplatform | Parse-Server | < 4.10.17 |
Related Weaknesses (CWE)
References
- https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6Third Party Advisory
- https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6Third Party Advisory
FAQ
What is CVE-2022-39313?
CVE-2022-39313 is a vulnerability with a CVSS score of 7.5 (HIGH). Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 4.10.17, and prior to 5.2.8 on the 5.x branch, crash when a file download requ...
How severe is CVE-2022-39313?
CVE-2022-39313 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-39313?
Check the references section above for vendor advisories and patch information. Affected products include: Parseplatform Parse-Server.