parse-server@9.3.0-alpha.8 vulnerabilities

An express module providing a Parse-compatible API server

  • latest version

    9.4.0

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    3 hours ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the parse-server package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Use of a Broken or Risky Cryptographic Algorithm

    parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.

    Affected versions of this package are vulnerable to Use of a Broken or Risky Cryptographic Algorithm via the Google authentication. An attacker can gain unauthorized access to any user account linked with Google authentication by forging a JWT token with alg set to "none". This is only exploitable if Google authentication is enabled.

    How to fix Use of a Broken or Risky Cryptographic Algorithm?

    Upgrade parse-server to version 8.6.3, 9.3.1-alpha.4 or higher.

    <8.6.3>=9.0.0-alpha.1 <9.3.1-alpha.4