{"id":"CVE-2022-36079","summary":"Parse Server vulnerable to brute force guessing of user sensitive data via search patterns","details":"Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server and are only returned to the client using a valid master key. However, using query constraints, these fields can be guessed by enumerating until Parse Server, prior to versions 4.10.14 or 5.2.5, returns a response object. The patch available in versions 4.10.14 and 5.2.5 requires the maser key to use internal and protected fields as query constraints. As a workaround, implement a Parse Cloud Trigger `beforeFind` and manually remove the query constraints.","aliases":["BIT-parse-2022-36079","GHSA-2m6g-crv8-p3c6"],"modified":"2026-03-11T00:19:08.157478Z","published":"2022-09-07T20:40:13Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36079.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-200"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36079.json"},{"type":"FIX","url":"https://github.com/parse-community/parse-server/commit/634c44acd18f6ee6ec60fac89a2b602d92799bec"},{"type":"FIX","url":"https://github.com/parse-community/parse-server/commit/e39d51bd329cd978589983bd659db46e1d45aad4"},{"type":"REPORT","url":"https://github.com/parse-community/parse-server/issues/8143"},{"type":"REPORT","url":"https://github.com/parse-community/parse-server/issues/8144"},{"type":"WEB","url":"https://github.com/parse-community/parse-server/releases/tag/4.10.14"},{"type":"WEB","url":"https://github.com/parse-community/parse-server/releases/tag/5.2.5"},{"type":"ADVISORY","url":"https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36079"},{"type":"WEB"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/parse-community/parse-server","events":[{"introduced":"0"},{"fixed":"e29f7c0431b244e6aa9cab34d302b7f92acc0b9f"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.10.14"}]}},{"type":"GIT","repo":"https://github.com/parse-community/parse-server","events":[{"introduced":"46c9a91627a0503f0364c4cc1cc9bba3c6a86d65"},{"fixed":"83fd16c1b911de1fee2c6184feff5933de455f56"}],"database_specific":{"versions":[{"introduced":"5.0.0"},{"fixed":"5.2.5"}]}}],"versions":["2.0.0","2.0.1","2.0.2","2.0.3","2.0.4","2.0.5","2.0.6","2.0.7","2.0.8","2.1.0","2.1.1","2.1.2","2.1.3","2.1.4","2.1.5","2.1.6","2.2.0","2.2.1","2.2.10","2.2.11","2.2.12","2.2.13","2.2.14","2.2.15","2.2.16","2.2.17","2.2.18","2.2.19","2.2.2","2.2.20","2.2.21","2.2.22","2.2.23","2.2.24","2.2.25","2.2.25-beta.1","2.2.3","2.2.4","2.2.5","2.2.6","2.2.7","2.2.8","2.2.9","2.3.1","2.3.2","2.3.3","2.3.4","2.3.5","2.3.6","2.3.7","2.3.8","2.4.0","2.4.1","2.4.2","2.5.0","2.5.1","2.5.2","2.5.3","2.6.0","2.6.1","2.6.2","2.6.3","2.6.4","2.6.5","2.7.0","2.7.1","2.7.2","2.7.3","2.7.4","2.8.0","2.8.2","3.0.0","3.1.0","3.1.1","3.1.2","3.1.3","3.10.0","3.2.0","3.2.1","3.2.2","3.2.3","3.3.0","3.4.0","3.4.1","3.5.0","3.6.0","3.7.0","3.7.1","3.7.2","3.8.0","3.9.0","4.0.0","4.0.1","4.0.2","4.1.0","4.10.0","4.10.1","4.10.10","4.10.11","4.10.12","4.10.13","4.10.2","4.10.3","4.10.4","4.10.5","4.10.6","4.10.7","4.10.8","4.10.9","4.2.0","4.3.0","4.4.0","4.5.0","4.5.2","5.0.0","5.0.0-alpha.10","5.0.0-alpha.11","5.0.0-alpha.12","5.0.0-alpha.13","5.0.0-alpha.14","5.0.0-alpha.15","5.0.0-alpha.16","5.0.0-alpha.17","5.0.0-alpha.18","5.0.0-alpha.19","5.0.0-alpha.20","5.0.0-alpha.21","5.0.0-alpha.22","5.0.0-alpha.23","5.0.0-alpha.24","5.0.0-alpha.25","5.0.0-alpha.26","5.0.0-alpha.27","5.0.0-alpha.28","5.0.0-alpha.29","5.0.0-alpha.6","5.0.0-alpha.7","5.0.0-alpha.8","5.0.0-alpha.9","5.0.0-beta.10","5.1.0","5.1.1","5.2.0","5.2.0-alpha.1","5.2.0-alpha.2","5.2.0-alpha.3","5.2.0-beta.1","5.2.0-beta.2","5.2.1","5.2.2","5.2.3","5.2.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36079.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}]}