logo

CVE-2020-15126 parse-server

Package

Manager: npm
Name: parse-server
Vulnerable Version: >=3.5.0 <4.3.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00461 pctl0.63237

Details

GraphQL: Security breach on Viewer query ### Impact An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object. ### Patches This vulnerability has been patched in Parse Server 4.3.0. ### Workarounds No ### References See [commit 78239ac](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa) for details.

Metadata

Created: 2020-07-22T23:06:47Z
Modified: 2023-10-26T11:33:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-236h-rqv8-8q73/GHSA-236h-rqv8-8q73.json
CWE IDs: ["CWE-863"]
Alternative ID: GHSA-236h-rqv8-8q73
Finding: F006
Auto approve: 1