Asymmetric denial of service In parse-server
Description
Parse Server: Denial of Service via unindexed database query for unconfigured auth providers
Impact
An unauthenticated attacker can cause Denial of Service by sending authentication requests with arbitrary, unconfigured provider names. The server executes a database query for each unconfigured provider before rejecting the request, and since no database index exists for unconfigured providers, each request triggers a full collection scan on the user database. This can be parallelized to saturate database resources.
Patches
The fix validates that an authentication provider is configured before executing any database query. Requests with unconfigured providers are now rejected immediately without querying the database.
Workarounds
There is no known workaround other than upgrading.
Resources
GitHub security advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-g4cf-xj29-wqqr
Fix Parse Server 9: https://github.com/parse-community/parse-server/pull/10270
Fix Parse Server 8: https://github.com/parse-community/parse-server/pull/10271
Mitigation
Update Impact
Minimal update. May introduce new vulnerabilities or breaking changes.
Ecosystem | Package | Affected version | Patched versions |
|---|---|---|---|
npm | parse-server | 9.6.0-alpha.52, 8.6.58 |
Aliases