
This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1.Īn information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This is reachable via the SetLanguage dbus function.
#RHINO FOR MAC 5.3.2 RESIZING TUTORIAL PATCH#
Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This affects Ubuntu, Debian, and Gentoo.Ī flaw was found in unzip. Code execution can, for example, use the -gtk-module option. USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. The only known workaround is to manually patch your installation with code referenced at the source GHSA-p6h4-93qp-jhcm. Users are advised to upgrade as soon as possible. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability affects Parse Server in the default configuration with MongoDB.

In versions prior to 4.10.7 there is a Remote Code Execution (RCE) vulnerability in Parse Server.

Parse Server is an open source http web server backend.
