CVE-2023-46119

7.5 HIGH

📋 TL;DR

Parse Server crashes when processing file uploads without file extensions, causing denial of service. This affects all Parse Server deployments running vulnerable versions, potentially disrupting backend services.

💻 Affected Systems

Products:
  • Parse Server
Versions: All versions before 5.5.6 and 6.3.1
Operating Systems: Any OS running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any Parse Server installation with file upload functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage through repeated exploitation, leading to extended downtime and potential data unavailability.

🟠

Likely Case

Service disruption and temporary unavailability of Parse Server backend functionality.

🟢

If Mitigated

Minimal impact with proper monitoring and rapid incident response to restart services.

🌐 Internet-Facing: HIGH - File upload endpoints are typically internet-facing, making them easily accessible to attackers.
🏢 Internal Only: MEDIUM - Internal users could still trigger the crash, but attack surface is more limited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request with file upload payload triggers the crash.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.6 or 6.3.1

Vendor Advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-792q-q67h-w579

Restart Required: Yes

Instructions:

1. Check current Parse Server version. 2. Update to 5.5.6 (for 5.x branch) or 6.3.1 (for 6.x branch). 3. Restart the Parse Server process.

🔧 Temporary Workarounds

File Extension Validation

all

Implement middleware to reject file uploads without extensions before they reach Parse Server

Rate Limiting

all

Implement rate limiting on file upload endpoints to limit impact of repeated attacks

🧯 If You Can't Patch

  • Implement WAF rules to block file uploads without extensions
  • Deploy Parse Server behind reverse proxy with request filtering capabilities

🔍 How to Verify

Check if Vulnerable:

Check if Parse Server crashes when uploading a file without extension via API endpoint

Check Version:

npm list parse-server | grep parse-server

Verify Fix Applied:

Test file upload without extension and verify service remains operational

📡 Detection & Monitoring

Log Indicators:

  • Parse Server process crashes
  • Error logs showing unhandled exceptions during file upload
  • Increased restart frequency

Network Indicators:

  • HTTP POST requests to /parse/files endpoint with files lacking extensions
  • Sudden service unavailability

SIEM Query:

source="parse-server" AND ("crash" OR "unhandled exception") AND "upload"

🔗 References

📤 Share & Export