If a POST request is made to /parse/classes/_Audience (or other volatile class), any subsuquent POST requests result in an internal server error (500).
Afflicted installations will also have to remove the offending collection from their database.
Yes, patched in 3.4.1
Yes, user can apply: https://github.com/parse-community/parse-server/commit/8709daf698ea69b59268cb66f0f7cee75b52daa5
Nothing other than this advisory at this time
If you have any questions or comments about this advisory: * Open an issue in parse-server * Email us at security@parseplatform.org
{
"nvd_published_at": null,
"cwe_ids": [
"CWE-444"
],
"github_reviewed_at": "2020-06-16T20:51:19Z",
"severity": "HIGH",
"github_reviewed": true
}