Page 5 of 27 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Developers can use the REST API to signup users and also allow users to login anonymously. Prior to version 4.5.1, when an anonymous user is first signed up using REST, the server creates session incorrectly. Particularly, the `authProvider` field in `_Session` class under `createdWith` shows the user logged in creating a password. If a developer later depends on the `createdWith` field to provide a different level of access between a password user and anonymous user, the server incorrectly classified the session type as being created with a `password`. • https://github.com/parse-community/parse-server/commit/147bd9a3dc43391e92c36e05d5db860b04ca27db https://github.com/parse-community/parse-server/releases/tag/4.5.1 https://github.com/parse-community/parse-server/security/advisories/GHSA-23r4-5mxp-c7g5 • CWE-287: Improper Authentication CWE-863: Incorrect Authorization •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 0

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. It is an npm package "parse-server". In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage. Parse Server es un backend de código abierto que puede ser implementado en cualquier infraestructura que pueda ejecutar Node.js. • https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a https://github.com/parse-community/parse-server/releases/tag/4.5.0 https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3 https://www.npmjs.com/package/parse-server • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched. El servidor de análisis (npm package parse-server) transmite eventos a todos los clientes sin comprobar si el testigo de sesión es válido. • https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58 https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj https://npmjs.com/parse-server • CWE-672: Operation on a Resource after Expiration or Release •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

In parser-server from version 3.5.0 and before 4.3.0, an authenticated user using the viewer GraphQL query can by pass all read security on his User object and can also by pass all objects linked via relation or Pointer on his User object. En parser-server desde la versión 3.5.0 y anteriores a 4.3.0, un usuario autenticado que use la consulta GraphQL del visualizador puede pasar toda la seguridad de lectura en su objeto Usuario y también puede pasar todos los objetos vinculados por medio de una relación o Puntero en su objeto de Usuario • https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430 https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73 • CWE-863: Incorrect Authorization •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 1

In parser-server before version 4.1.0, you can fetch all the users objects, by using regex in the NoSQL query. Using the NoSQL, you can use a regex on sessionToken and find valid accounts this way. En parser-server versiones anteriores a 4.1.0, pueden obtener todos los objetos de los usuarios, mediante el uso de regex en la consulta NoSQL. Usando el NoSQL, pueden usar un regex en sessionToken y encontrar cuentas válidas de esta manera. • https://github.com/ossf-cve-benchmark/CVE-2020-5251 https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269 https://github.com/parse-community/parse-server/security/advisories/GHSA-h4mf-75hf-67w4 • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •