Improper Authentication Affecting parse-server package, versions <4.10.4
Threat Intelligence
EPSS
0.14% (51st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-PARSESERVER-1727337
- published 1 Oct 2021
- disclosed 1 Oct 2021
- credit Unknown
Introduced: 1 Oct 2021
CVE-2021-41109 Open this link in a new tabHow to fix?
Upgrade parse-server
to version 4.10.4 or higher.
Overview
parse-server is a version of the Parse backend that can be deployed to any infrastructure that can run Node.js.
Affected versions of this package are vulnerable to Improper Authentication. For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the Parse.User
class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload.
References
CVSS Scores
version 3.1