First published: Wed Mar 04 2020(Updated: )
In parser-server before version 4.1.0, you can fetch all the users objects, by using regex in the NoSQL query. Using the NoSQL, you can use a regex on sessionToken and find valid accounts this way.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parseplatform Parse-server | <4.1.0 |
https://github.com/parse-community/parse-server/commit/3a3a5eee5ffa48da1352423312cb767de14de269
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5251 is a vulnerability in parser-server before version 4.1.0 that allows an attacker to fetch all user objects using a regex in the NoSQL query.
An attacker can exploit CVE-2020-5251 by using a regex on the sessionToken to find valid accounts.
CVE-2020-5251 has a severity rating of 5.3 (High).
Versions of parse-server up to and excluding 4.1.0 are affected by CVE-2020-5251.
To fix CVE-2020-5251, upgrade to version 4.1.0 or later of parse-server.