First published: Wed Jul 22 2020(Updated: )
### Impact An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object. ### Patches This vulnerability has been patched in Parse Server 4.3.0. ### Workarounds No ### References See [commit 78239ac](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa) for details.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parseplatform Parse Server | >=3.5.0<4.3.0 | |
npm/parse-server | >=3.5.0<4.3.0 | 4.3.0 |
https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15126 is a vulnerability in parser-server that allows an authenticated user to bypass read security on their User object and linked objects.
The impact of CVE-2020-15126 is that an authenticated user can bypass read security on their User object and linked objects.
CVE-2020-15126 has been fixed in Parse Server 4.3.0, so upgrading to this version will fix the vulnerability.
No, there are no workarounds for CVE-2020-15126.
You can find more information about CVE-2020-15126 in the references provided: [GitHub Changelog](https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430), [GitHub Commit](https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa), [GitHub Security Advisory](https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73).