CVE-2019-1020013 – parse-server
Package
Manager: npm
Name: parse-server
Vulnerable Version: >=0 <3.6.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00232 pctl0.45963
Details
Sensitive Data Exposure in parse-server Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking. `ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information about linked accounts/email addresses. ### For more information If you have any questions or comments about this advisory, Open an issue in the [parse-server](https://github.com/parse-community/parse-server) [Parse Community Vulnerability Disclosure Program](https://github.com/parse-community/parse-server/blob/master/SECURITY.md)
Metadata
Created: 2019-07-11T14:23:09Z
Modified: 2021-06-11T15:37:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/07/GHSA-8w3j-g983-8jh5/GHSA-8w3j-g983-8jh5.json
CWE IDs: ["CWE-209"]
Alternative ID: GHSA-8w3j-g983-8jh5
Finding: F037
Auto approve: 1