Vulnerabilities (CVE)

Filtered by vendor Parseplatform Subscribe
Total 28 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-39187 1 Parseplatform 1 Parse-server 2024-02-28 5.0 MEDIUM 7.5 HIGH
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.3, Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch. There is a patch for this issue in version 4.10.3. No workarounds aside from upgrading are known to exist.
CVE-2021-39138 1 Parseplatform 1 Parse-server 2024-02-28 6.4 MEDIUM 6.5 MEDIUM
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Developers can use the REST API to signup users and also allow users to login anonymously. Prior to version 4.5.1, when an anonymous user is first signed up using REST, the server creates session incorrectly. Particularly, the `authProvider` field in `_Session` class under `createdWith` shows the user logged in creating a password. If a developer later depends on the `createdWith` field to provide a different level of access between a password user and anonymous user, the server incorrectly classified the session type as being created with a `password`. The server does not currently use `createdWith` to make decisions about internal functions, so if a developer is not using `createdWith` directly, they are not affected. The vulnerability only affects users who depend on `createdWith` by using it directly. The issue is patched in Parse Server version 4.5.1. As a workaround, do not use the `createdWith` Session field to make decisions if one allows anonymous login.
CVE-2020-15270 1 Parseplatform 1 Parse-server 2024-02-28 4.0 MEDIUM 4.3 MEDIUM
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched.
CVE-2020-26288 1 Parseplatform 1 Parse-server 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. It is an npm package "parse-server". In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
CVE-2020-15126 1 Parseplatform 1 Parse Server 2024-02-28 4.0 MEDIUM 6.5 MEDIUM
In parser-server from version 3.5.0 and before 4.3.0, an authenticated user using the viewer GraphQL query can by pass all read security on his User object and can also by pass all objects linked via relation or Pointer on his User object.
CVE-2020-5251 1 Parseplatform 1 Parse-server 2024-02-28 5.0 MEDIUM 5.3 MEDIUM
In parser-server before version 4.1.0, you can fetch all the users objects, by using regex in the NoSQL query. Using the NoSQL, you can use a regex on sessionToken and find valid accounts this way.
CVE-2019-1020013 1 Parseplatform 1 Parse-server 2024-02-28 5.0 MEDIUM 5.3 MEDIUM
parse-server before 3.6.0 allows account enumeration.
CVE-2019-1020012 1 Parseplatform 1 Parse-server 2024-02-28 5.0 MEDIUM 7.5 HIGH
parse-server before 3.4.1 allows DoS after any POST to a volatile class.