Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8xq9-g7ch-35hg

Опубликовано: 04 окт. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.6
CVSS3: 8.1

Описание

Parse Server's custom object ID allows to acquire role privileges

Impact

If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role.

Patches

Improved validation for custom user object IDs. Session tokens for existing users with an object ID that exploits the vulnerability are now rejected.

Workarounds

  • Disable custom object IDs by setting allowCustomObjectId: false or not setting the option which defaults to false.
  • Use a Cloud Code Trigger to validate that a new user's object ID doesn't start with the prefix role:.

References

Пакеты

Наименование

parse-server

npm
Затронутые версииВерсия исправления

< 6.5.9

6.5.9

Наименование

parse-server

npm
Затронутые версииВерсия исправления

>= 7.0.0, < 7.3.0

7.3.0

EPSS

Процентиль: 51%
0.00282
Низкий

8.6 High

CVSS4

8.1 High

CVSS3

Дефекты

CWE-285
CWE-863

Связанные уязвимости

CVSS3: 8.1
nvd
больше 1 года назад

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. If the Parse Server option allowCustomObjectId: true is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role. This vulnerability is fixed in 6.5.9 and 7.3.0.

EPSS

Процентиль: 51%
0.00282
Низкий

8.6 High

CVSS4

8.1 High

CVSS3

Дефекты

CWE-285
CWE-863