9.5.1
13 years ago
6 days ago
Known vulnerabilities in the parse-server package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Data Query Logic in the How to fix Improper Neutralization of Special Elements in Data Query Logic? Upgrade | <8.6.38>=9.0.0-alpha.1 <9.6.0-alpha.12 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Race Condition in the OAuth2 auth adapter. An attacker can gain unauthorized access by exploiting a race condition that causes token validation to occur against the wrong provider's configuration during concurrent authentication requests. This is only exploitable if multiple OAuth2 providers are configured via the How to fix Race Condition? Upgrade | <8.6.37>=9.0.0-alpha.1 <9.6.0-alpha.11 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Information Exposure in the LiveQuery subscription process. An attacker can infer the values of protected fields by crafting a subscription with a WHERE clause that references protected fields, including using dot-notation or Note: This is only exploitable if both protectedFields are configured in Class-Level Permissions and LiveQuery is enabled. How to fix Information Exposure? Upgrade | <8.6.35>=9.0.0-alpha.1 <9.6.0-alpha.9 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to SQL Injection via the Note: This is only exploitable if the deployment is configured to use PostgreSQL as the database and the attacker possesses the master key. How to fix SQL Injection? Upgrade | <8.6.36>=9.0.0-alpha.1 <9.6.0-alpha.10 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Missing Authorization via direct access to internal relationship tables through the REST API or GraphQL API using only the application key. An attacker can gain unauthorized permissions and access to protected resources by creating, reading, updating, or deleting records in any internal relationship table, which may result in bypassing access controls and escalating privileges. How to fix Missing Authorization? Upgrade | <8.6.20>=9.0.0-alpha.1 <9.5.2-alpha.7 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Insufficiently Protected Credentials in the OAuth2 authentication process when the Note: This is only exploitable if the generic OAuth2 authentication adapter is enabled with How to fix Insufficiently Protected Credentials? Upgrade | <8.6.22>=9.0.0-alpha.1 <9.5.2-alpha.9 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling through unbounded query complexity in the REST and GraphQL APIs. An attacker can exhaust server resources, such as CPU, memory, and database connections, by sending specially crafted queries that lack enforced complexity limits. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | <8.6.15>=9.0.0-alpha.1 <9.5.2-alpha.2 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to SQL Injection in the How to fix SQL Injection? Upgrade | <8.6.31>=9.0.0-alpha.1 <9.6.0-alpha.5 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Incorrect Authorization in Note: This is only exploitable if LiveQuery is enabled for classes with class-level permissions. How to fix Incorrect Authorization? Upgrade | <8.6.16>=9.0.0-alpha.1 <9.5.2-alpha.3 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Improper Control of Interaction Frequency in the Note: This is only exploitable if the deployment relies solely on the built-in rate limiting feature without additional protections such as a reverse proxy or web application firewall. How to fix Improper Control of Interaction Frequency? Upgrade | <8.6.23>=9.0.0-alpha.1 <9.5.2-alpha.10 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Operation on a Resource after Expiration or Release due to the recovery code. An attacker can repeatedly gain unauthorized access to user accounts by reusing the same recovery code without it being invalidated. How to fix Operation on a Resource after Expiration or Release? Upgrade | <8.6.33>=9.0.0-alpha.1 <9.6.0-alpha.7 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Improper Neutralization of Special Elements in Data Query Logic via the Note This is only exploitable if email verification or password reset is enabled and, for full email verification token extraction, if How to fix Improper Neutralization of Special Elements in Data Query Logic? Upgrade | <8.6.14>=9.0.0-alpha.1 <9.5.2-alpha.1 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Incorrect Authorization in the handling of How to fix Incorrect Authorization? Upgrade | <8.6.32>=9.0.0-alpha.1 <9.6.0-alpha.6 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Information Exposure in the How to fix Information Exposure? Upgrade | <8.6.34>=9.0.0-alpha.1 <9.6.0-alpha.8 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the file upload. An attacker can execute arbitrary scripts in the context of the application domain by uploading specially crafted files with certain extensions or content types that are not blocked by default. This can lead to theft of session tokens, redirection of users, or unauthorized actions performed on behalf of users when the uploaded file is accessed in a browser. How to fix Cross-site Scripting (XSS)? Upgrade | <8.6.30>=9.0.0-alpha.1 <9.6.0-alpha.4 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to LDAP Injection via unsanitized input in the Note: This is only exploitable if the LDAP authentication adapter is enabled with group-based access control. How to fix LDAP Injection? Upgrade | <8.6.26>=9.0.0-alpha.1 <9.5.2-alpha.13 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Incorrect Authorization in the query validation. An authenticated user can access sensitive field values by wrapping constraints on protected fields inside logical query operators, thereby bypassing intended access restrictions. How to fix Incorrect Authorization? Upgrade | <8.6.19>=9.0.0-alpha.1 <9.5.2-alpha.6 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Missing Authorization via the generic How to fix Missing Authorization? Upgrade | <8.6.25>=9.0.0-alpha.1 <9.5.2-alpha.12 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to SQL Injection in the PostgreSQL storage adapter when processing How to fix SQL Injection? Upgrade | <8.6.29>=9.0.0-alpha.1 <9.6.0-alpha.3 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to SQL Injection in the handling of dot-notation field names with the Note: This is only exploitable if the deployment is configured to use a PostgreSQL database. How to fix SQL Injection? Upgrade | <8.6.28>=9.0.0-alpha.1 <9.6.0-alpha.2 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the file upload process. An attacker can execute arbitrary JavaScript in the context of the application origin by uploading a crafted SVG file containing malicious scripts, which are then served inline without protective headers. This can lead to theft of session tokens from How to fix Cross-site Scripting (XSS)? Upgrade | <8.6.17>=9.0.0 <9.5.2-alpha.4 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Prototype Pollution via How to fix Prototype Pollution? Upgrade | >=9.0.0-alpha.1 <9.5.1-alpha.2<8.6.13 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions via the How to fix Improper Check for Unusual or Exceptional Conditions? Upgrade | >=9.0.0-alpha.1 <9.5.1-alpha.1<8.6.12 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the handling of Note: This only affects LiveQuery subscription matching; Normal REST and GraphQL queries are not affected because their regex is evaluated by the database engine. How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | <8.6.11>=9.0.0 <9.5.0-alpha.14 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Missing Authorization in the ##Workaround This vulnerability can be mitigated by disabling the How to fix Missing Authorization? Upgrade | <8.6.9>=9.0.0-alpha.1 <9.5.0-alpha.9 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Improper Verification of Cryptographic Signature in the authentication process when the audience configuration option is not set. An attacker can gain unauthorized access by presenting a validly signed JWT issued for a different application. How to fix Improper Verification of Cryptographic Signature? Upgrade | <8.6.10>=9.0.0-alpha.1 <9.5.0-alpha.11 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Directory Traversal via the How to fix Directory Traversal? Upgrade | <8.6.8>=9.0.0-alpha.1 <9.5.0-alpha.8 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Information Exposure in the query execution layer. An attacker can obtain internal database error details, including error messages, codes, and topology information, by submitting a malformed How to fix Information Exposure? Upgrade | <8.6.7>=9.0.0-alpha.1 <9.5.0-alpha.6 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Incorrect Authorization via the Note: This is only exploitable if the How to fix Incorrect Authorization? Upgrade | <8.6.6>=9.0.0-alpha.1 <9.5.0-alpha.4 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Incorrect Authorization via the How to fix Incorrect Authorization? Upgrade | <8.6.5>=9.0.0-alpha.1 <9.5.0-alpha.3 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Incorrect Authorization in the handling of the How to fix Incorrect Authorization? Upgrade | <8.6.4>=9.0.0-alpha.1 <9.4.1-alpha.3 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm via the Google authentication. An attacker can gain unauthorized access to any user account linked with Google authentication by forging a JWT token with How to fix Use of a Broken or Risky Cryptographic Algorithm? Upgrade | <8.6.3>=9.0.0-alpha.1 <9.3.1-alpha.4 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the How to fix Server-side Request Forgery (SSRF)? Upgrade | <8.6.2>=9.0.0 <9.1.1-alpha.1 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the rendering of user-supplied input in the HTML pages for password reset and email verification. An attacker can execute arbitrary scripts in the context of a user's browser by crafting malicious input that is reflected in these pages. How to fix Cross-site Scripting (XSS)? Upgrade | <8.6.1>=9.0.0-alpha.1 <9.1.0-alpha.3 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Insertion of Sensitive Information Into Sent Data via the How to fix Insertion of Sensitive Information Into Sent Data? Upgrade | <8.5.0-alpha.5 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the file upload functionality. An attacker can cause the server to crash by supplying a crafted URI parameter that triggers a request to an arbitrary URI, resulting in a denial of service. How to fix Allocation of Resources Without Limits or Throttling? Upgrade | >=4.2.0 <7.5.4>=8.0.0 <8.4.0-alpha.2 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Improper Authentication due to the improper handling of authentication credentials across multiple applications. An attacker can exploit this vulnerability to authenticate using credentials from one application in another unrelated application by leveraging shared authentication providers. How to fix Improper Authentication? Upgrade | <7.5.2>=8.0.0 <8.0.2 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Improper Authorization when the How to fix Improper Authorization? Upgrade | <6.5.9>=7.0.0 <7.3.0 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to SQL Injection when Parse Server is configured to use the How to fix SQL Injection? Upgrade | <6.5.7>=7.0.0 <7.1.0 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Improper Input Validation for Cloud Function names and Cloud Job names. Exploiting this vulnerability allows an attacker to cause a denial of service or execute arbitrary code by sending a specially crafted request. How to fix Improper Input Validation? Upgrade | <6.5.5>=7.0.0-alpha.1 <7.0.0-alpha.29 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to SQL Injection via a malicious PostgreSQL statement containing multiple quoted strings. This vulnerability is only present when the PostgreSQL engine is in use. How to fix SQL Injection? Upgrade | <6.5.0>=7.0.0-alpha.1 <7.0.0-alpha.20 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption ('Resource Exhaustion') via the file upload function. An attacker can cause the server to crash by uploading a file without an extension. How to fix Uncontrolled Resource Consumption ('Resource Exhaustion')? Upgrade | >=1.0.0 <5.5.6>=6.0.0 <6.3.1 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Access Restriction Bypass via the How to fix Access Restriction Bypass? Upgrade | >=1.0.0 <5.5.5>=6.0.0 <6.2.2 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Prototype Pollution in the MongoDB BSON parser, which allows attackers to execute code on the affected system. How to fix Prototype Pollution? Upgrade | <5.5.2>=6.0.0-alpha.1 <6.2.1 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Arbitrary File Upload such that a malicious user could upload an HTML file to Parse Server via its public API. That HTML file would then be accessible at the internet domain at which Parse Server is hosted. The URL of the uploaded HTML could be shared for phishing attacks. The HTML page may seem legitimate because it is served under the internet domain where Parse Server is hosted, which may be the same as a company's official website domain. Note: An additional security issue arises when the Parse JavaScript SDK is used. The SDK stores sessions in the internet browser's local storage, which usually restricts data access depending on the internet domain. A malicious HTML file could contain a script that retrieves the user's session token from local storage and then share it with the attacker. How to fix Arbitrary File Upload? Upgrade | <5.5.0>=6.0.0 <6.2.0 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Authentication Bypass due to insufficient checks in the mechanism used to determine the client's IP address. How to fix Authentication Bypass? Upgrade | <5.4.1 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Prototype Pollution such that a compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server How to fix Prototype Pollution? Upgrade | <4.10.20>=5.0.0 <5.3.3 |
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js. Affected versions of this package are vulnerable to Prototype Pollution such that keywords that are specified in the Parse Server option How to fix Prototype Pollution? Upgrade | <4.10.19>=5.0.0 <5.3.2 |