VYPR

npm package

parse-server

pkg:npm/parse-server

Vulnerabilities (106)

  • CVE-2020-26288Dec 30, 2020
    affected < 4.5.0fixed 4.5.0

    Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. It is an npm package "parse-server". In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.

  • CVE-2020-15270Oct 22, 2020
    affected < 4.4.0fixed 4.4.0

    Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens.

  • CVE-2020-15126Jul 22, 2020
    affected >= 3.5.0, < 4.3.0fixed 4.3.0

    In parser-server from version 3.5.0 and before 4.3.0, an authenticated user using the viewer GraphQL query can by pass all read security on his User object and can also by pass all objects linked via relation or Pointer on his User object.

  • CVE-2020-5251Mar 4, 2020
    affected < 4.1.0fixed 4.1.0

    In parser-server before version 4.1.0, you can fetch all the users objects, by using regex in the NoSQL query. Using the NoSQL, you can use a regex on sessionToken and find valid accounts this way.

  • CVE-2019-1020013Jul 29, 2019
    affected < 3.6.0fixed 3.6.0

    parse-server before 3.6.0 allows account enumeration.

  • CVE-2019-1020012Jul 29, 2019
    affected < 3.4.1fixed 3.4.1

    parse-server before 3.4.1 allows DoS after any POST to a volatile class.

Page 6 of 6