Releases: parse-community/parse-server
Releases · parse-community/parse-server
5.0.0-beta.8
5.0.0-beta.8 (2022-03-12)
Bug Fixes
- security vulnerability that allows remote code execution (GHSA-p6h4-93qp-jhcm) (#7843) (971adb5)
5.0.0-alpha.29
5.0.0-alpha.29 (2022-03-12)
Features
BREAKING CHANGES
- This requires Node.js version >=12.22.10. (5ace99d)
5.0.0-alpha.28
5.0.0-alpha.28 (2022-03-12)
Bug Fixes
- security vulnerability that allows remote code execution (GHSA-p6h4-93qp-jhcm) (#7844) (e569f40)
5.0.0-alpha.27
4.10.7
4.10.7 (2022-03-11)
Bug Fixes
-
security vulnerability that allows remote code execution (GHSA-p6h4-93qp-jhcm) (#7841) (886bfd7)
Note that as part of the fix a new security feature scans for sensitive keywords in request data to prevent JavaScript prototype pollution. If such a keyword is found, the request is rejected with HTTP response code
400
and Parse Error105
(INVALID_KEY_NAME
). By default these keywords are:{_bsontype: "Code"}
,constructor
,__proto__
. If you are using any of these keywords in your request data, you can override the default keywords by setting the new Parse Server optionrequestKeywordDenylist
to[]
and specify your own keywords as needed.