VYPR
High severityNVD Advisory· Published Jun 30, 2022· Updated Apr 23, 2025

Protected fields exposed via LiveQuery in parse-server

CVE-2022-31112

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions parse Server LiveQuery does not remove protected fields in classes, passing them to the client. The LiveQueryController now removes protected fields from the client response. Users are advised to upgrade. Users unable t upgrade should use Parse.Cloud.afterLiveQueryEvent to manually remove protected fields.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
parse-servernpm
< 4.10.134.10.13
parse-servernpm
>= 5.0.0, < 5.2.45.2.4

Affected products

1

Patches

3
9fd4516cde5c

fix: protected fields exposed via LiveQuery (GHSA-crrq-vr9j-fxxh) [skip release] (#8076)

4 files changed · +125 23
  • spec/ParseLiveQuery.spec.js+46 0 modified
    @@ -1110,6 +1110,52 @@ describe('ParseLiveQuery', function () {
         }
       });
     
    +  it('should strip out protected fields', async () => {
    +    await reconfigureServer({
    +      liveQuery: { classNames: ['Test'] },
    +      startLiveQueryServer: true,
    +    });
    +    const obj1 = new Parse.Object('Test');
    +    obj1.set('foo', 'foo');
    +    obj1.set('bar', 'bar');
    +    obj1.set('qux', 'qux');
    +    await obj1.save();
    +    const config = Config.get(Parse.applicationId);
    +    const schemaController = await config.database.loadSchema();
    +    await schemaController.updateClass(
    +      'Test',
    +      {},
    +      {
    +        get: { '*': true },
    +        find: { '*': true },
    +        update: { '*': true },
    +        protectedFields: {
    +          '*': ['foo'],
    +        },
    +      }
    +    );
    +    const object = await obj1.fetch();
    +    expect(object.get('foo')).toBe(undefined);
    +    expect(object.get('bar')).toBeDefined();
    +    expect(object.get('qux')).toBeDefined();
    +
    +    const subscription = await new Parse.Query('Test').subscribe();
    +    await Promise.all([
    +      new Promise(resolve => {
    +        subscription.on('update', (obj, original) => {
    +          expect(obj.get('foo')).toBe(undefined);
    +          expect(obj.get('bar')).toBeDefined();
    +          expect(obj.get('qux')).toBeDefined();
    +          expect(original.get('foo')).toBe(undefined);
    +          expect(original.get('bar')).toBeDefined();
    +          expect(original.get('qux')).toBeDefined();
    +          resolve();
    +        });
    +      }),
    +      obj1.save({ foo: 'abc' }),
    +    ]);
    +  });
    +
       afterEach(async function (done) {
         const client = await Parse.CoreManager.getLiveQueryController().getDefaultLiveQueryClient();
         client.close();
    
  • src/Controllers/DatabaseController.js+10 4 modified
    @@ -127,7 +127,7 @@ const filterSensitiveData = (
       aclGroup: any[],
       auth: any,
       operation: any,
    -  schema: SchemaController.SchemaController,
    +  schema: SchemaController.SchemaController | any,
       className: string,
       protectedFields: null | Array<any>,
       object: any
    @@ -136,7 +136,8 @@ const filterSensitiveData = (
       if (auth && auth.user) userId = auth.user.id;
     
       // replace protectedFields when using pointer-permissions
    -  const perms = schema.getClassLevelPermissions(className);
    +  const perms =
    +    schema && schema.getClassLevelPermissions ? schema.getClassLevelPermissions(className) : {};
       if (perms) {
         const isReadOperation = ['get', 'find'].indexOf(operation) > -1;
     
    @@ -1533,14 +1534,17 @@ class DatabaseController {
       }
     
       addProtectedFields(
    -    schema: SchemaController.SchemaController,
    +    schema: SchemaController.SchemaController | any,
         className: string,
         query: any = {},
         aclGroup: any[] = [],
         auth: any = {},
         queryOptions: FullQueryOptions = {}
       ): null | string[] {
    -    const perms = schema.getClassLevelPermissions(className);
    +    const perms =
    +      schema && schema.getClassLevelPermissions
    +        ? schema.getClassLevelPermissions(className)
    +        : schema;
         if (!perms) return null;
     
         const protectedFields = perms.protectedFields;
    @@ -1806,8 +1810,10 @@ class DatabaseController {
       }
     
       static _validateQuery: any => void;
    +  static filterSensitiveData: (boolean, any[], any, any, any, string, any[], any) => void;
     }
     
     module.exports = DatabaseController;
     // Expose validateQuery for tests
     module.exports._validateQuery = validateQuery;
    +module.exports.filterSensitiveData = filterSensitiveData;
    
  • src/LiveQuery/ParseCloudCodePublisher.js+3 0 modified
    @@ -40,6 +40,9 @@ class ParseCloudCodePublisher {
         if (request.original) {
           message.originalParseObject = request.original._toFullJSON();
         }
    +    if (request.classLevelPermissions) {
    +      message.classLevelPermissions = request.classLevelPermissions;
    +    }
         this.parsePublisher.publish(type, JSON.stringify(message));
       }
     }
    
  • src/LiveQuery/ParseLiveQueryServer.js+66 19 modified
    @@ -18,9 +18,10 @@ import {
       toJSONwithObjects,
     } from '../triggers';
     import { getAuthForSessionToken, Auth } from '../Auth';
    -import { getCacheController } from '../Controllers';
    +import { getCacheController, getDatabaseController } from '../Controllers';
     import LRU from 'lru-cache';
     import UserRouter from '../Routers/UsersRouter';
    +import DatabaseController from '../Controllers/DatabaseController';
     
     class ParseLiveQueryServer {
       clients: Map;
    @@ -196,14 +197,14 @@ class ParseLiveQueryServer {
                 if (res.object && typeof res.object.toJSON === 'function') {
                   deletedParseObject = toJSONwithObjects(res.object, res.object.className || className);
                 }
    -            if (
    -              (deletedParseObject.className === '_User' ||
    -                deletedParseObject.className === '_Session') &&
    -              !client.hasMasterKey
    -            ) {
    -              delete deletedParseObject.sessionToken;
    -              delete deletedParseObject.authData;
    -            }
    +            await this._filterSensitiveData(
    +              classLevelPermissions,
    +              res,
    +              client,
    +              requestId,
    +              op,
    +              subscription.query
    +            );
                 client.pushDelete(requestId, deletedParseObject);
               } catch (e) {
                 const error = resolveError(e);
    @@ -350,16 +351,14 @@ class ParseLiveQueryServer {
                     res.original.className || className
                   );
                 }
    -            if (
    -              (currentParseObject.className === '_User' ||
    -                currentParseObject.className === '_Session') &&
    -              !client.hasMasterKey
    -            ) {
    -              delete currentParseObject.sessionToken;
    -              delete originalParseObject?.sessionToken;
    -              delete currentParseObject.authData;
    -              delete originalParseObject?.authData;
    -            }
    +            await this._filterSensitiveData(
    +              classLevelPermissions,
    +              res,
    +              client,
    +              requestId,
    +              op,
    +              subscription.query
    +            );
                 const functionName = 'push' + res.event.charAt(0).toUpperCase() + res.event.slice(1);
                 if (client[functionName]) {
                   client[functionName](requestId, currentParseObject, originalParseObject);
    @@ -577,6 +576,54 @@ class ParseLiveQueryServer {
         // return rolesQuery.find({useMasterKey:true});
       }
     
    +  async _filterSensitiveData(
    +    classLevelPermissions: ?any,
    +    res: any,
    +    client: any,
    +    requestId: number,
    +    op: string,
    +    query: any
    +  ) {
    +    const subscriptionInfo = client.getSubscriptionInfo(requestId);
    +    const aclGroup = ['*'];
    +    let clientAuth;
    +    if (typeof subscriptionInfo !== 'undefined') {
    +      const { userId, auth } = await this.getAuthForSessionToken(subscriptionInfo.sessionToken);
    +      if (userId) {
    +        aclGroup.push(userId);
    +      }
    +      clientAuth = auth;
    +    }
    +    const filter = obj => {
    +      if (!obj) {
    +        return;
    +      }
    +      let protectedFields = classLevelPermissions?.protectedFields || [];
    +      if (!client.hasMasterKey && !Array.isArray(protectedFields)) {
    +        protectedFields = getDatabaseController(this.config).addProtectedFields(
    +          classLevelPermissions,
    +          res.object.className,
    +          query,
    +          aclGroup,
    +          clientAuth
    +        );
    +      }
    +      return DatabaseController.filterSensitiveData(
    +        client.hasMasterKey,
    +        aclGroup,
    +        clientAuth,
    +        op,
    +        classLevelPermissions,
    +        res.object.className,
    +        protectedFields,
    +        obj,
    +        query
    +      );
    +    };
    +    res.object = filter(res.object);
    +    res.original = filter(res.original);
    +  }
    +
       _getCLPOperation(query: any) {
         return typeof query === 'object' &&
           Object.keys(query).length == 1 &&
    
309f64ced870

fix: protected fields exposed via LiveQuery; this removes protected fields from the client response; this may be a breaking change if your app is currently expecting to receive these protected fields ([GHSA-crrq-vr9j-fxxh](https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh)) (https://github.com/parse-community/parse-server/pull/8074) (#8073)

4 files changed · +132 24
  • spec/ParseLiveQuery.spec.js+46 0 modified
    @@ -1066,6 +1066,52 @@ describe('ParseLiveQuery', function () {
         }
       });
     
    +  it('should strip out protected fields', async () => {
    +    await reconfigureServer({
    +      liveQuery: { classNames: ['Test'] },
    +      startLiveQueryServer: true,
    +    });
    +    const obj1 = new Parse.Object('Test');
    +    obj1.set('foo', 'foo');
    +    obj1.set('bar', 'bar');
    +    obj1.set('qux', 'qux');
    +    await obj1.save();
    +    const config = Config.get(Parse.applicationId);
    +    const schemaController = await config.database.loadSchema();
    +    await schemaController.updateClass(
    +      'Test',
    +      {},
    +      {
    +        get: { '*': true },
    +        find: { '*': true },
    +        update: { '*': true },
    +        protectedFields: {
    +          '*': ['foo'],
    +        },
    +      }
    +    );
    +    const object = await obj1.fetch();
    +    expect(object.get('foo')).toBe(undefined);
    +    expect(object.get('bar')).toBeDefined();
    +    expect(object.get('qux')).toBeDefined();
    +
    +    const subscription = await new Parse.Query('Test').subscribe();
    +    await Promise.all([
    +      new Promise(resolve => {
    +        subscription.on('update', (obj, original) => {
    +          expect(obj.get('foo')).toBe(undefined);
    +          expect(obj.get('bar')).toBeDefined();
    +          expect(obj.get('qux')).toBeDefined();
    +          expect(original.get('foo')).toBe(undefined);
    +          expect(original.get('bar')).toBeDefined();
    +          expect(original.get('qux')).toBeDefined();
    +          resolve();
    +        });
    +      }),
    +      obj1.save({ foo: 'abc' }),
    +    ]);
    +  });
    +
       afterEach(async function (done) {
         const client = await Parse.CoreManager.getLiveQueryController().getDefaultLiveQueryClient();
         client.close();
    
  • src/Controllers/DatabaseController.js+10 4 modified
    @@ -127,7 +127,7 @@ const filterSensitiveData = (
       aclGroup: any[],
       auth: any,
       operation: any,
    -  schema: SchemaController.SchemaController,
    +  schema: SchemaController.SchemaController | any,
       className: string,
       protectedFields: null | Array<any>,
       object: any
    @@ -136,7 +136,8 @@ const filterSensitiveData = (
       if (auth && auth.user) userId = auth.user.id;
     
       // replace protectedFields when using pointer-permissions
    -  const perms = schema.getClassLevelPermissions(className);
    +  const perms =
    +    schema && schema.getClassLevelPermissions ? schema.getClassLevelPermissions(className) : {};
       if (perms) {
         const isReadOperation = ['get', 'find'].indexOf(operation) > -1;
     
    @@ -1533,14 +1534,17 @@ class DatabaseController {
       }
     
       addProtectedFields(
    -    schema: SchemaController.SchemaController,
    +    schema: SchemaController.SchemaController | any,
         className: string,
         query: any = {},
         aclGroup: any[] = [],
         auth: any = {},
         queryOptions: FullQueryOptions = {}
       ): null | string[] {
    -    const perms = schema.getClassLevelPermissions(className);
    +    const perms =
    +      schema && schema.getClassLevelPermissions
    +        ? schema.getClassLevelPermissions(className)
    +        : schema;
         if (!perms) return null;
     
         const protectedFields = perms.protectedFields;
    @@ -1806,8 +1810,10 @@ class DatabaseController {
       }
     
       static _validateQuery: any => void;
    +  static filterSensitiveData: (boolean, any[], any, any, any, string, any[], any) => void;
     }
     
     module.exports = DatabaseController;
     // Expose validateQuery for tests
     module.exports._validateQuery = validateQuery;
    +module.exports.filterSensitiveData = filterSensitiveData;
    
  • src/LiveQuery/ParseCloudCodePublisher.js+3 0 modified
    @@ -33,6 +33,9 @@ class ParseCloudCodePublisher {
         if (request.original) {
           message.originalParseObject = request.original._toFullJSON();
         }
    +    if (request.classLevelPermissions) {
    +      message.classLevelPermissions = request.classLevelPermissions;
    +    }
         this.parsePublisher.publish(type, JSON.stringify(message));
       }
     }
    
  • src/LiveQuery/ParseLiveQueryServer.js+73 20 modified
    @@ -10,11 +10,18 @@ import { ParsePubSub } from './ParsePubSub';
     import SchemaController from '../Controllers/SchemaController';
     import _ from 'lodash';
     import { v4 as uuidv4 } from 'uuid';
    -import { runLiveQueryEventHandlers, getTrigger, runTrigger, resolveError, toJSONwithObjects } from '../triggers';
    +import {
    +  runLiveQueryEventHandlers,
    +  getTrigger,
    +  runTrigger,
    +  resolveError,
    +  toJSONwithObjects,
    +} from '../triggers';
     import { getAuthForSessionToken, Auth } from '../Auth';
    -import { getCacheController } from '../Controllers';
    +import { getCacheController, getDatabaseController } from '../Controllers';
     import LRU from 'lru-cache';
     import UserRouter from '../Routers/UsersRouter';
    +import DatabaseController from '../Controllers/DatabaseController';
     
     class ParseLiveQueryServer {
       clients: Map;
    @@ -185,14 +192,14 @@ class ParseLiveQueryServer {
                 if (res.object && typeof res.object.toJSON === 'function') {
                   deletedParseObject = toJSONwithObjects(res.object, res.object.className || className);
                 }
    -            if (
    -              (deletedParseObject.className === '_User' ||
    -                deletedParseObject.className === '_Session') &&
    -              !client.hasMasterKey
    -            ) {
    -              delete deletedParseObject.sessionToken;
    -              delete deletedParseObject.authData;
    -            }
    +            await this._filterSensitiveData(
    +              classLevelPermissions,
    +              res,
    +              client,
    +              requestId,
    +              op,
    +              subscription.query
    +            );
                 client.pushDelete(requestId, deletedParseObject);
               } catch (e) {
                 const error = resolveError(e);
    @@ -339,16 +346,14 @@ class ParseLiveQueryServer {
                     res.original.className || className
                   );
                 }
    -            if (
    -              (currentParseObject.className === '_User' ||
    -                currentParseObject.className === '_Session') &&
    -              !client.hasMasterKey
    -            ) {
    -              delete currentParseObject.sessionToken;
    -              delete originalParseObject?.sessionToken;
    -              delete currentParseObject.authData;
    -              delete originalParseObject?.authData;
    -            }
    +            await this._filterSensitiveData(
    +              classLevelPermissions,
    +              res,
    +              client,
    +              requestId,
    +              op,
    +              subscription.query
    +            );
                 const functionName = 'push' + res.event.charAt(0).toUpperCase() + res.event.slice(1);
                 if (client[functionName]) {
                   client[functionName](requestId, currentParseObject, originalParseObject);
    @@ -540,6 +545,54 @@ class ParseLiveQueryServer {
         // return rolesQuery.find({useMasterKey:true});
       }
     
    +  async _filterSensitiveData(
    +    classLevelPermissions: ?any,
    +    res: any,
    +    client: any,
    +    requestId: number,
    +    op: string,
    +    query: any
    +  ) {
    +    const subscriptionInfo = client.getSubscriptionInfo(requestId);
    +    const aclGroup = ['*'];
    +    let clientAuth;
    +    if (typeof subscriptionInfo !== 'undefined') {
    +      const { userId, auth } = await this.getAuthForSessionToken(subscriptionInfo.sessionToken);
    +      if (userId) {
    +        aclGroup.push(userId);
    +      }
    +      clientAuth = auth;
    +    }
    +    const filter = obj => {
    +      if (!obj) {
    +        return;
    +      }
    +      let protectedFields = classLevelPermissions?.protectedFields || [];
    +      if (!client.hasMasterKey && !Array.isArray(protectedFields)) {
    +        protectedFields = getDatabaseController(this.config).addProtectedFields(
    +          classLevelPermissions,
    +          res.object.className,
    +          query,
    +          aclGroup,
    +          clientAuth
    +        );
    +      }
    +      return DatabaseController.filterSensitiveData(
    +        client.hasMasterKey,
    +        aclGroup,
    +        clientAuth,
    +        op,
    +        classLevelPermissions,
    +        res.object.className,
    +        protectedFields,
    +        obj,
    +        query
    +      );
    +    };
    +    res.object = filter(res.object);
    +    res.original = filter(res.original);
    +  }
    +
       _getCLPOperation(query: any) {
         return typeof query === 'object' &&
           Object.keys(query).length == 1 &&
    
054f3e6ab01d

fix: protected fields exposed via LiveQuery; this removes protected fields from the client response; this may be a breaking change if your app is currently expecting to receive these protected fields ([GHSA-crrq-vr9j-fxxh](https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh)) (#8074)

4 files changed · +126 25
  • spec/ParseLiveQuery.spec.js+46 0 modified
    @@ -974,6 +974,52 @@ describe('ParseLiveQuery', function () {
         }
       });
     
    +  it('should strip out protected fields', async () => {
    +    await reconfigureServer({
    +      liveQuery: { classNames: ['Test'] },
    +      startLiveQueryServer: true,
    +    });
    +    const obj1 = new Parse.Object('Test');
    +    obj1.set('foo', 'foo');
    +    obj1.set('bar', 'bar');
    +    obj1.set('qux', 'qux');
    +    await obj1.save();
    +    const config = Config.get(Parse.applicationId);
    +    const schemaController = await config.database.loadSchema();
    +    await schemaController.updateClass(
    +      'Test',
    +      {},
    +      {
    +        get: { '*': true },
    +        find: { '*': true },
    +        update: { '*': true },
    +        protectedFields: {
    +          '*': ['foo'],
    +        },
    +      }
    +    );
    +    const object = await obj1.fetch();
    +    expect(object.get('foo')).toBe(undefined);
    +    expect(object.get('bar')).toBeDefined();
    +    expect(object.get('qux')).toBeDefined();
    +
    +    const subscription = await new Parse.Query('Test').subscribe();
    +    await Promise.all([
    +      new Promise(resolve => {
    +        subscription.on('update', (obj, original) => {
    +          expect(obj.get('foo')).toBe(undefined);
    +          expect(obj.get('bar')).toBeDefined();
    +          expect(obj.get('qux')).toBeDefined();
    +          expect(original.get('foo')).toBe(undefined);
    +          expect(original.get('bar')).toBeDefined();
    +          expect(original.get('qux')).toBeDefined();
    +          resolve();
    +        });
    +      }),
    +      obj1.save({ foo: 'abc' }),
    +    ]);
    +  });
    +
       afterEach(async function (done) {
         const client = await Parse.CoreManager.getLiveQueryController().getDefaultLiveQueryClient();
         client.close();
    
  • src/Controllers/DatabaseController.js+10 4 modified
    @@ -123,7 +123,7 @@ const filterSensitiveData = (
       aclGroup: any[],
       auth: any,
       operation: any,
    -  schema: SchemaController.SchemaController,
    +  schema: SchemaController.SchemaController | any,
       className: string,
       protectedFields: null | Array<any>,
       object: any
    @@ -132,7 +132,8 @@ const filterSensitiveData = (
       if (auth && auth.user) userId = auth.user.id;
     
       // replace protectedFields when using pointer-permissions
    -  const perms = schema.getClassLevelPermissions(className);
    +  const perms =
    +    schema && schema.getClassLevelPermissions ? schema.getClassLevelPermissions(className) : {};
       if (perms) {
         const isReadOperation = ['get', 'find'].indexOf(operation) > -1;
     
    @@ -1430,14 +1431,17 @@ class DatabaseController {
       }
     
       addProtectedFields(
    -    schema: SchemaController.SchemaController,
    +    schema: SchemaController.SchemaController | any,
         className: string,
         query: any = {},
         aclGroup: any[] = [],
         auth: any = {},
         queryOptions: FullQueryOptions = {}
       ): null | string[] {
    -    const perms = schema.getClassLevelPermissions(className);
    +    const perms =
    +      schema && schema.getClassLevelPermissions
    +        ? schema.getClassLevelPermissions(className)
    +        : schema;
         if (!perms) return null;
     
         const protectedFields = perms.protectedFields;
    @@ -1741,8 +1745,10 @@ class DatabaseController {
       }
     
       static _validateQuery: any => void;
    +  static filterSensitiveData: (boolean, any[], any, any, any, string, any[], any) => void;
     }
     
     module.exports = DatabaseController;
     // Expose validateQuery for tests
     module.exports._validateQuery = validateQuery;
    +module.exports.filterSensitiveData = filterSensitiveData;
    
  • src/LiveQuery/ParseCloudCodePublisher.js+3 0 modified
    @@ -33,6 +33,9 @@ class ParseCloudCodePublisher {
         if (request.original) {
           message.originalParseObject = request.original._toFullJSON();
         }
    +    if (request.classLevelPermissions) {
    +      message.classLevelPermissions = request.classLevelPermissions;
    +    }
         this.parsePublisher.publish(type, JSON.stringify(message));
       }
     }
    
  • src/LiveQuery/ParseLiveQueryServer.js+67 21 modified
    @@ -17,9 +17,10 @@ import {
       maybeRunAfterEventTrigger,
     } from '../triggers';
     import { getAuthForSessionToken, Auth } from '../Auth';
    -import { getCacheController } from '../Controllers';
    +import { getCacheController, getDatabaseController } from '../Controllers';
     import LRU from 'lru-cache';
     import UserRouter from '../Routers/UsersRouter';
    +import DatabaseController from '../Controllers/DatabaseController';
     
     class ParseLiveQueryServer {
       clients: Map;
    @@ -171,22 +172,22 @@ class ParseLiveQueryServer {
                   };
                   return maybeRunAfterEventTrigger('afterEvent', className, res);
                 })
    -            .then(() => {
    +            .then(async () => {
                   if (!res.sendEvent) {
                     return;
                   }
                   if (res.object && typeof res.object.toJSON === 'function') {
                     deletedParseObject = res.object.toJSON();
                     deletedParseObject.className = className;
                   }
    -              if (
    -                (deletedParseObject.className === '_User' ||
    -                  deletedParseObject.className === '_Session') &&
    -                !client.hasMasterKey
    -              ) {
    -                delete deletedParseObject.sessionToken;
    -                delete deletedParseObject.authData;
    -              }
    +              await this._filterSensitiveData(
    +                classLevelPermissions,
    +                res,
    +                client,
    +                requestId,
    +                op,
    +                subscription.query
    +              );
                   client.pushDelete(requestId, deletedParseObject);
                 })
                 .catch(error => {
    @@ -310,7 +311,7 @@ class ParseLiveQueryServer {
                   return maybeRunAfterEventTrigger('afterEvent', className, res);
                 })
                 .then(
    -              () => {
    +              async () => {
                     if (!res.sendEvent) {
                       return;
                     }
    @@ -323,16 +324,14 @@ class ParseLiveQueryServer {
                       originalParseObject = res.original.toJSON();
                       originalParseObject.className = res.original.className || className;
                     }
    -                if (
    -                  (currentParseObject.className === '_User' ||
    -                    currentParseObject.className === '_Session') &&
    -                  !client.hasMasterKey
    -                ) {
    -                  delete currentParseObject.sessionToken;
    -                  delete originalParseObject?.sessionToken;
    -                  delete currentParseObject.authData;
    -                  delete originalParseObject?.authData;
    -                }
    +                await this._filterSensitiveData(
    +                  classLevelPermissions,
    +                  res,
    +                  client,
    +                  requestId,
    +                  op,
    +                  subscription.query
    +                );
                     const functionName =
                       'push' + message.event.charAt(0).toUpperCase() + message.event.slice(1);
                     if (client[functionName]) {
    @@ -532,6 +531,53 @@ class ParseLiveQueryServer {
         // return rolesQuery.find({useMasterKey:true});
       }
     
    +  async _filterSensitiveData(
    +    classLevelPermissions: ?any,
    +    res: any,
    +    client: any,
    +    requestId: number,
    +    op: string,
    +    query: any
    +  ) {
    +    const subscriptionInfo = client.getSubscriptionInfo(requestId);
    +    const aclGroup = ['*'];
    +    let clientAuth;
    +    if (typeof subscriptionInfo !== 'undefined') {
    +      const { userId, auth } = await this.getAuthForSessionToken(subscriptionInfo.sessionToken);
    +      if (userId) {
    +        aclGroup.push(userId);
    +      }
    +      clientAuth = auth;
    +    }
    +    const filter = obj => {
    +      if (!obj) {
    +        return;
    +      }
    +      let protectedFields = classLevelPermissions?.protectedFields || [];
    +      if (!client.hasMasterKey && !Array.isArray(protectedFields)) {
    +        protectedFields = getDatabaseController(this.config).addProtectedFields(
    +          classLevelPermissions,
    +          res.object.className,
    +          query,
    +          aclGroup,
    +          clientAuth
    +        );
    +      }
    +      return DatabaseController.filterSensitiveData(
    +        client.hasMasterKey,
    +        aclGroup,
    +        clientAuth,
    +        op,
    +        classLevelPermissions,
    +        res.object.className,
    +        protectedFields,
    +        obj
    +      );
    +    };
    +    res.object = filter(res.object);
    +    res.original = filter(res.original);
    +  }
    +
       _getCLPOperation(query: any) {
         return typeof query === 'object' &&
           Object.keys(query).length == 1 &&
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

9

News mentions

0

No linked articles in our index yet.