Protected fields exposed via LiveQuery in parse-server
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions parse Server LiveQuery does not remove protected fields in classes, passing them to the client. The LiveQueryController now removes protected fields from the client response. Users are advised to upgrade. Users unable t upgrade should use Parse.Cloud.afterLiveQueryEvent to manually remove protected fields.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
parse-servernpm | < 4.10.13 | 4.10.13 |
parse-servernpm | >= 5.0.0, < 5.2.4 | 5.2.4 |
Affected products
1- Range: < 4.10.13
Patches
39fd4516cde5cfix: protected fields exposed via LiveQuery (GHSA-crrq-vr9j-fxxh) [skip release] (#8076)
4 files changed · +125 −23
spec/ParseLiveQuery.spec.js+46 −0 modified@@ -1110,6 +1110,52 @@ describe('ParseLiveQuery', function () { } }); + it('should strip out protected fields', async () => { + await reconfigureServer({ + liveQuery: { classNames: ['Test'] }, + startLiveQueryServer: true, + }); + const obj1 = new Parse.Object('Test'); + obj1.set('foo', 'foo'); + obj1.set('bar', 'bar'); + obj1.set('qux', 'qux'); + await obj1.save(); + const config = Config.get(Parse.applicationId); + const schemaController = await config.database.loadSchema(); + await schemaController.updateClass( + 'Test', + {}, + { + get: { '*': true }, + find: { '*': true }, + update: { '*': true }, + protectedFields: { + '*': ['foo'], + }, + } + ); + const object = await obj1.fetch(); + expect(object.get('foo')).toBe(undefined); + expect(object.get('bar')).toBeDefined(); + expect(object.get('qux')).toBeDefined(); + + const subscription = await new Parse.Query('Test').subscribe(); + await Promise.all([ + new Promise(resolve => { + subscription.on('update', (obj, original) => { + expect(obj.get('foo')).toBe(undefined); + expect(obj.get('bar')).toBeDefined(); + expect(obj.get('qux')).toBeDefined(); + expect(original.get('foo')).toBe(undefined); + expect(original.get('bar')).toBeDefined(); + expect(original.get('qux')).toBeDefined(); + resolve(); + }); + }), + obj1.save({ foo: 'abc' }), + ]); + }); + afterEach(async function (done) { const client = await Parse.CoreManager.getLiveQueryController().getDefaultLiveQueryClient(); client.close();
src/Controllers/DatabaseController.js+10 −4 modified@@ -127,7 +127,7 @@ const filterSensitiveData = ( aclGroup: any[], auth: any, operation: any, - schema: SchemaController.SchemaController, + schema: SchemaController.SchemaController | any, className: string, protectedFields: null | Array<any>, object: any @@ -136,7 +136,8 @@ const filterSensitiveData = ( if (auth && auth.user) userId = auth.user.id; // replace protectedFields when using pointer-permissions - const perms = schema.getClassLevelPermissions(className); + const perms = + schema && schema.getClassLevelPermissions ? schema.getClassLevelPermissions(className) : {}; if (perms) { const isReadOperation = ['get', 'find'].indexOf(operation) > -1; @@ -1533,14 +1534,17 @@ class DatabaseController { } addProtectedFields( - schema: SchemaController.SchemaController, + schema: SchemaController.SchemaController | any, className: string, query: any = {}, aclGroup: any[] = [], auth: any = {}, queryOptions: FullQueryOptions = {} ): null | string[] { - const perms = schema.getClassLevelPermissions(className); + const perms = + schema && schema.getClassLevelPermissions + ? schema.getClassLevelPermissions(className) + : schema; if (!perms) return null; const protectedFields = perms.protectedFields; @@ -1806,8 +1810,10 @@ class DatabaseController { } static _validateQuery: any => void; + static filterSensitiveData: (boolean, any[], any, any, any, string, any[], any) => void; } module.exports = DatabaseController; // Expose validateQuery for tests module.exports._validateQuery = validateQuery; +module.exports.filterSensitiveData = filterSensitiveData;
src/LiveQuery/ParseCloudCodePublisher.js+3 −0 modified@@ -40,6 +40,9 @@ class ParseCloudCodePublisher { if (request.original) { message.originalParseObject = request.original._toFullJSON(); } + if (request.classLevelPermissions) { + message.classLevelPermissions = request.classLevelPermissions; + } this.parsePublisher.publish(type, JSON.stringify(message)); } }
src/LiveQuery/ParseLiveQueryServer.js+66 −19 modified@@ -18,9 +18,10 @@ import { toJSONwithObjects, } from '../triggers'; import { getAuthForSessionToken, Auth } from '../Auth'; -import { getCacheController } from '../Controllers'; +import { getCacheController, getDatabaseController } from '../Controllers'; import LRU from 'lru-cache'; import UserRouter from '../Routers/UsersRouter'; +import DatabaseController from '../Controllers/DatabaseController'; class ParseLiveQueryServer { clients: Map; @@ -196,14 +197,14 @@ class ParseLiveQueryServer { if (res.object && typeof res.object.toJSON === 'function') { deletedParseObject = toJSONwithObjects(res.object, res.object.className || className); } - if ( - (deletedParseObject.className === '_User' || - deletedParseObject.className === '_Session') && - !client.hasMasterKey - ) { - delete deletedParseObject.sessionToken; - delete deletedParseObject.authData; - } + await this._filterSensitiveData( + classLevelPermissions, + res, + client, + requestId, + op, + subscription.query + ); client.pushDelete(requestId, deletedParseObject); } catch (e) { const error = resolveError(e); @@ -350,16 +351,14 @@ class ParseLiveQueryServer { res.original.className || className ); } - if ( - (currentParseObject.className === '_User' || - currentParseObject.className === '_Session') && - !client.hasMasterKey - ) { - delete currentParseObject.sessionToken; - delete originalParseObject?.sessionToken; - delete currentParseObject.authData; - delete originalParseObject?.authData; - } + await this._filterSensitiveData( + classLevelPermissions, + res, + client, + requestId, + op, + subscription.query + ); const functionName = 'push' + res.event.charAt(0).toUpperCase() + res.event.slice(1); if (client[functionName]) { client[functionName](requestId, currentParseObject, originalParseObject); @@ -577,6 +576,54 @@ class ParseLiveQueryServer { // return rolesQuery.find({useMasterKey:true}); } + async _filterSensitiveData( + classLevelPermissions: ?any, + res: any, + client: any, + requestId: number, + op: string, + query: any + ) { + const subscriptionInfo = client.getSubscriptionInfo(requestId); + const aclGroup = ['*']; + let clientAuth; + if (typeof subscriptionInfo !== 'undefined') { + const { userId, auth } = await this.getAuthForSessionToken(subscriptionInfo.sessionToken); + if (userId) { + aclGroup.push(userId); + } + clientAuth = auth; + } + const filter = obj => { + if (!obj) { + return; + } + let protectedFields = classLevelPermissions?.protectedFields || []; + if (!client.hasMasterKey && !Array.isArray(protectedFields)) { + protectedFields = getDatabaseController(this.config).addProtectedFields( + classLevelPermissions, + res.object.className, + query, + aclGroup, + clientAuth + ); + } + return DatabaseController.filterSensitiveData( + client.hasMasterKey, + aclGroup, + clientAuth, + op, + classLevelPermissions, + res.object.className, + protectedFields, + obj, + query + ); + }; + res.object = filter(res.object); + res.original = filter(res.original); + } + _getCLPOperation(query: any) { return typeof query === 'object' && Object.keys(query).length == 1 &&
309f64ced870fix: protected fields exposed via LiveQuery; this removes protected fields from the client response; this may be a breaking change if your app is currently expecting to receive these protected fields ([GHSA-crrq-vr9j-fxxh](https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh)) (https://github.com/parse-community/parse-server/pull/8074) (#8073)
4 files changed · +132 −24
spec/ParseLiveQuery.spec.js+46 −0 modified@@ -1066,6 +1066,52 @@ describe('ParseLiveQuery', function () { } }); + it('should strip out protected fields', async () => { + await reconfigureServer({ + liveQuery: { classNames: ['Test'] }, + startLiveQueryServer: true, + }); + const obj1 = new Parse.Object('Test'); + obj1.set('foo', 'foo'); + obj1.set('bar', 'bar'); + obj1.set('qux', 'qux'); + await obj1.save(); + const config = Config.get(Parse.applicationId); + const schemaController = await config.database.loadSchema(); + await schemaController.updateClass( + 'Test', + {}, + { + get: { '*': true }, + find: { '*': true }, + update: { '*': true }, + protectedFields: { + '*': ['foo'], + }, + } + ); + const object = await obj1.fetch(); + expect(object.get('foo')).toBe(undefined); + expect(object.get('bar')).toBeDefined(); + expect(object.get('qux')).toBeDefined(); + + const subscription = await new Parse.Query('Test').subscribe(); + await Promise.all([ + new Promise(resolve => { + subscription.on('update', (obj, original) => { + expect(obj.get('foo')).toBe(undefined); + expect(obj.get('bar')).toBeDefined(); + expect(obj.get('qux')).toBeDefined(); + expect(original.get('foo')).toBe(undefined); + expect(original.get('bar')).toBeDefined(); + expect(original.get('qux')).toBeDefined(); + resolve(); + }); + }), + obj1.save({ foo: 'abc' }), + ]); + }); + afterEach(async function (done) { const client = await Parse.CoreManager.getLiveQueryController().getDefaultLiveQueryClient(); client.close();
src/Controllers/DatabaseController.js+10 −4 modified@@ -127,7 +127,7 @@ const filterSensitiveData = ( aclGroup: any[], auth: any, operation: any, - schema: SchemaController.SchemaController, + schema: SchemaController.SchemaController | any, className: string, protectedFields: null | Array<any>, object: any @@ -136,7 +136,8 @@ const filterSensitiveData = ( if (auth && auth.user) userId = auth.user.id; // replace protectedFields when using pointer-permissions - const perms = schema.getClassLevelPermissions(className); + const perms = + schema && schema.getClassLevelPermissions ? schema.getClassLevelPermissions(className) : {}; if (perms) { const isReadOperation = ['get', 'find'].indexOf(operation) > -1; @@ -1533,14 +1534,17 @@ class DatabaseController { } addProtectedFields( - schema: SchemaController.SchemaController, + schema: SchemaController.SchemaController | any, className: string, query: any = {}, aclGroup: any[] = [], auth: any = {}, queryOptions: FullQueryOptions = {} ): null | string[] { - const perms = schema.getClassLevelPermissions(className); + const perms = + schema && schema.getClassLevelPermissions + ? schema.getClassLevelPermissions(className) + : schema; if (!perms) return null; const protectedFields = perms.protectedFields; @@ -1806,8 +1810,10 @@ class DatabaseController { } static _validateQuery: any => void; + static filterSensitiveData: (boolean, any[], any, any, any, string, any[], any) => void; } module.exports = DatabaseController; // Expose validateQuery for tests module.exports._validateQuery = validateQuery; +module.exports.filterSensitiveData = filterSensitiveData;
src/LiveQuery/ParseCloudCodePublisher.js+3 −0 modified@@ -33,6 +33,9 @@ class ParseCloudCodePublisher { if (request.original) { message.originalParseObject = request.original._toFullJSON(); } + if (request.classLevelPermissions) { + message.classLevelPermissions = request.classLevelPermissions; + } this.parsePublisher.publish(type, JSON.stringify(message)); } }
src/LiveQuery/ParseLiveQueryServer.js+73 −20 modified@@ -10,11 +10,18 @@ import { ParsePubSub } from './ParsePubSub'; import SchemaController from '../Controllers/SchemaController'; import _ from 'lodash'; import { v4 as uuidv4 } from 'uuid'; -import { runLiveQueryEventHandlers, getTrigger, runTrigger, resolveError, toJSONwithObjects } from '../triggers'; +import { + runLiveQueryEventHandlers, + getTrigger, + runTrigger, + resolveError, + toJSONwithObjects, +} from '../triggers'; import { getAuthForSessionToken, Auth } from '../Auth'; -import { getCacheController } from '../Controllers'; +import { getCacheController, getDatabaseController } from '../Controllers'; import LRU from 'lru-cache'; import UserRouter from '../Routers/UsersRouter'; +import DatabaseController from '../Controllers/DatabaseController'; class ParseLiveQueryServer { clients: Map; @@ -185,14 +192,14 @@ class ParseLiveQueryServer { if (res.object && typeof res.object.toJSON === 'function') { deletedParseObject = toJSONwithObjects(res.object, res.object.className || className); } - if ( - (deletedParseObject.className === '_User' || - deletedParseObject.className === '_Session') && - !client.hasMasterKey - ) { - delete deletedParseObject.sessionToken; - delete deletedParseObject.authData; - } + await this._filterSensitiveData( + classLevelPermissions, + res, + client, + requestId, + op, + subscription.query + ); client.pushDelete(requestId, deletedParseObject); } catch (e) { const error = resolveError(e); @@ -339,16 +346,14 @@ class ParseLiveQueryServer { res.original.className || className ); } - if ( - (currentParseObject.className === '_User' || - currentParseObject.className === '_Session') && - !client.hasMasterKey - ) { - delete currentParseObject.sessionToken; - delete originalParseObject?.sessionToken; - delete currentParseObject.authData; - delete originalParseObject?.authData; - } + await this._filterSensitiveData( + classLevelPermissions, + res, + client, + requestId, + op, + subscription.query + ); const functionName = 'push' + res.event.charAt(0).toUpperCase() + res.event.slice(1); if (client[functionName]) { client[functionName](requestId, currentParseObject, originalParseObject); @@ -540,6 +545,54 @@ class ParseLiveQueryServer { // return rolesQuery.find({useMasterKey:true}); } + async _filterSensitiveData( + classLevelPermissions: ?any, + res: any, + client: any, + requestId: number, + op: string, + query: any + ) { + const subscriptionInfo = client.getSubscriptionInfo(requestId); + const aclGroup = ['*']; + let clientAuth; + if (typeof subscriptionInfo !== 'undefined') { + const { userId, auth } = await this.getAuthForSessionToken(subscriptionInfo.sessionToken); + if (userId) { + aclGroup.push(userId); + } + clientAuth = auth; + } + const filter = obj => { + if (!obj) { + return; + } + let protectedFields = classLevelPermissions?.protectedFields || []; + if (!client.hasMasterKey && !Array.isArray(protectedFields)) { + protectedFields = getDatabaseController(this.config).addProtectedFields( + classLevelPermissions, + res.object.className, + query, + aclGroup, + clientAuth + ); + } + return DatabaseController.filterSensitiveData( + client.hasMasterKey, + aclGroup, + clientAuth, + op, + classLevelPermissions, + res.object.className, + protectedFields, + obj, + query + ); + }; + res.object = filter(res.object); + res.original = filter(res.original); + } + _getCLPOperation(query: any) { return typeof query === 'object' && Object.keys(query).length == 1 &&
054f3e6ab01dfix: protected fields exposed via LiveQuery; this removes protected fields from the client response; this may be a breaking change if your app is currently expecting to receive these protected fields ([GHSA-crrq-vr9j-fxxh](https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh)) (#8074)
4 files changed · +126 −25
spec/ParseLiveQuery.spec.js+46 −0 modified@@ -974,6 +974,52 @@ describe('ParseLiveQuery', function () { } }); + it('should strip out protected fields', async () => { + await reconfigureServer({ + liveQuery: { classNames: ['Test'] }, + startLiveQueryServer: true, + }); + const obj1 = new Parse.Object('Test'); + obj1.set('foo', 'foo'); + obj1.set('bar', 'bar'); + obj1.set('qux', 'qux'); + await obj1.save(); + const config = Config.get(Parse.applicationId); + const schemaController = await config.database.loadSchema(); + await schemaController.updateClass( + 'Test', + {}, + { + get: { '*': true }, + find: { '*': true }, + update: { '*': true }, + protectedFields: { + '*': ['foo'], + }, + } + ); + const object = await obj1.fetch(); + expect(object.get('foo')).toBe(undefined); + expect(object.get('bar')).toBeDefined(); + expect(object.get('qux')).toBeDefined(); + + const subscription = await new Parse.Query('Test').subscribe(); + await Promise.all([ + new Promise(resolve => { + subscription.on('update', (obj, original) => { + expect(obj.get('foo')).toBe(undefined); + expect(obj.get('bar')).toBeDefined(); + expect(obj.get('qux')).toBeDefined(); + expect(original.get('foo')).toBe(undefined); + expect(original.get('bar')).toBeDefined(); + expect(original.get('qux')).toBeDefined(); + resolve(); + }); + }), + obj1.save({ foo: 'abc' }), + ]); + }); + afterEach(async function (done) { const client = await Parse.CoreManager.getLiveQueryController().getDefaultLiveQueryClient(); client.close();
src/Controllers/DatabaseController.js+10 −4 modified@@ -123,7 +123,7 @@ const filterSensitiveData = ( aclGroup: any[], auth: any, operation: any, - schema: SchemaController.SchemaController, + schema: SchemaController.SchemaController | any, className: string, protectedFields: null | Array<any>, object: any @@ -132,7 +132,8 @@ const filterSensitiveData = ( if (auth && auth.user) userId = auth.user.id; // replace protectedFields when using pointer-permissions - const perms = schema.getClassLevelPermissions(className); + const perms = + schema && schema.getClassLevelPermissions ? schema.getClassLevelPermissions(className) : {}; if (perms) { const isReadOperation = ['get', 'find'].indexOf(operation) > -1; @@ -1430,14 +1431,17 @@ class DatabaseController { } addProtectedFields( - schema: SchemaController.SchemaController, + schema: SchemaController.SchemaController | any, className: string, query: any = {}, aclGroup: any[] = [], auth: any = {}, queryOptions: FullQueryOptions = {} ): null | string[] { - const perms = schema.getClassLevelPermissions(className); + const perms = + schema && schema.getClassLevelPermissions + ? schema.getClassLevelPermissions(className) + : schema; if (!perms) return null; const protectedFields = perms.protectedFields; @@ -1741,8 +1745,10 @@ class DatabaseController { } static _validateQuery: any => void; + static filterSensitiveData: (boolean, any[], any, any, any, string, any[], any) => void; } module.exports = DatabaseController; // Expose validateQuery for tests module.exports._validateQuery = validateQuery; +module.exports.filterSensitiveData = filterSensitiveData;
src/LiveQuery/ParseCloudCodePublisher.js+3 −0 modified@@ -33,6 +33,9 @@ class ParseCloudCodePublisher { if (request.original) { message.originalParseObject = request.original._toFullJSON(); } + if (request.classLevelPermissions) { + message.classLevelPermissions = request.classLevelPermissions; + } this.parsePublisher.publish(type, JSON.stringify(message)); } }
src/LiveQuery/ParseLiveQueryServer.js+67 −21 modified@@ -17,9 +17,10 @@ import { maybeRunAfterEventTrigger, } from '../triggers'; import { getAuthForSessionToken, Auth } from '../Auth'; -import { getCacheController } from '../Controllers'; +import { getCacheController, getDatabaseController } from '../Controllers'; import LRU from 'lru-cache'; import UserRouter from '../Routers/UsersRouter'; +import DatabaseController from '../Controllers/DatabaseController'; class ParseLiveQueryServer { clients: Map; @@ -171,22 +172,22 @@ class ParseLiveQueryServer { }; return maybeRunAfterEventTrigger('afterEvent', className, res); }) - .then(() => { + .then(async () => { if (!res.sendEvent) { return; } if (res.object && typeof res.object.toJSON === 'function') { deletedParseObject = res.object.toJSON(); deletedParseObject.className = className; } - if ( - (deletedParseObject.className === '_User' || - deletedParseObject.className === '_Session') && - !client.hasMasterKey - ) { - delete deletedParseObject.sessionToken; - delete deletedParseObject.authData; - } + await this._filterSensitiveData( + classLevelPermissions, + res, + client, + requestId, + op, + subscription.query + ); client.pushDelete(requestId, deletedParseObject); }) .catch(error => { @@ -310,7 +311,7 @@ class ParseLiveQueryServer { return maybeRunAfterEventTrigger('afterEvent', className, res); }) .then( - () => { + async () => { if (!res.sendEvent) { return; } @@ -323,16 +324,14 @@ class ParseLiveQueryServer { originalParseObject = res.original.toJSON(); originalParseObject.className = res.original.className || className; } - if ( - (currentParseObject.className === '_User' || - currentParseObject.className === '_Session') && - !client.hasMasterKey - ) { - delete currentParseObject.sessionToken; - delete originalParseObject?.sessionToken; - delete currentParseObject.authData; - delete originalParseObject?.authData; - } + await this._filterSensitiveData( + classLevelPermissions, + res, + client, + requestId, + op, + subscription.query + ); const functionName = 'push' + message.event.charAt(0).toUpperCase() + message.event.slice(1); if (client[functionName]) { @@ -532,6 +531,53 @@ class ParseLiveQueryServer { // return rolesQuery.find({useMasterKey:true}); } + async _filterSensitiveData( + classLevelPermissions: ?any, + res: any, + client: any, + requestId: number, + op: string, + query: any + ) { + const subscriptionInfo = client.getSubscriptionInfo(requestId); + const aclGroup = ['*']; + let clientAuth; + if (typeof subscriptionInfo !== 'undefined') { + const { userId, auth } = await this.getAuthForSessionToken(subscriptionInfo.sessionToken); + if (userId) { + aclGroup.push(userId); + } + clientAuth = auth; + } + const filter = obj => { + if (!obj) { + return; + } + let protectedFields = classLevelPermissions?.protectedFields || []; + if (!client.hasMasterKey && !Array.isArray(protectedFields)) { + protectedFields = getDatabaseController(this.config).addProtectedFields( + classLevelPermissions, + res.object.className, + query, + aclGroup, + clientAuth + ); + } + return DatabaseController.filterSensitiveData( + client.hasMasterKey, + aclGroup, + clientAuth, + op, + classLevelPermissions, + res.object.className, + protectedFields, + obj + ); + }; + res.object = filter(res.object); + res.original = filter(res.original); + } + _getCLPOperation(query: any) { return typeof query === 'object' && Object.keys(query).length == 1 &&
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- github.com/advisories/GHSA-crrq-vr9j-fxxhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-31112ghsaADVISORY
- github.com/parse-community/parse-server/commit/054f3e6ab01d66a0dcfb77725af28eac1485b375ghsaWEB
- github.com/parse-community/parse-server/commit/309f64ced8700321df056fb3cc97f15007a00df1ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/commit/9fd4516cde5c742f9f29dd05468b4a43a85639a6ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/issues/8073ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/pull/8074ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/releases/tag/5.2.4ghsax_refsource_MISCWEB
- github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxhghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.