First published: Mon Sep 04 2023(Updated: )
### Impact A Parse Pointer can be used to access internal Parse Server classes. It can also be used to circumvent the `beforeFind` query trigger which can be an additional vulnerability for deployments where the `beforeFind` trigger is used as a security layer to modify an incoming query. ### Patches The vulnerability was fixed by implementing a patch in the internal query pipeline to prevent a Parse Pointer to be used to access internal Parse Server classes or circumvent the `beforeFind` trigger. ### Workarounds There is no known workaround to prevent a Parse Pointer to be used to access internal Parse Server classes. A workaround if a `beforeFind` trigger is used as a security layer is to instead use the Parse Server provided [security layers](https://docs.parseplatform.org/parse-server/guide/#security) to manage access levels with Class-Level Permissions and Object-Level Access Control. ### References - GitHub security advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-fcv6-fg5r-jm9q - Patched in Parse Server 6.x: https://github.com/parse-community/parse-server/releases/tag/6.2.2 - Patched in Parse Server 5.x (LTS): https://github.com/parse-community/parse-server/releases/tag/5.5.5
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Parseplatform Parse-server | <5.5.5 | |
Parseplatform Parse-server | >=6.0.0<6.2.2 | |
npm/parse-server | >=6.0.0<6.2.2 | 6.2.2 |
npm/parse-server | >=1.0.0<5.5.5 | 5.5.5 |
https://github.com/parse-community/parse-server/commit/be4c7e23c63a2fb690685665cebed0de26be05c5
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41058 is a vulnerability in Parse Server that allows a Parse Pointer to access internal classes and bypass the beforeFind query trigger.
The impact of CVE-2023-41058 is that it can bypass the beforeFind query trigger, which can be a security vulnerability if the trigger is being used to modify incoming queries.
CVE-2023-41058 has a severity rating of 7.5 (High).
To fix CVE-2023-41058, update Parse Server to version 6.2.2 or above.
You can find more information about CVE-2023-41058 at the following references: [Reference 1](https://github.com/parse-community/parse-server/security/advisories/GHSA-fcv6-fg5r-jm9q), [Reference 2](https://nvd.nist.gov/vuln/detail/CVE-2023-41058), [Reference 3](https://github.com/parse-community/parse-server/commit/be4c7e23c63a2fb690685665cebed0de26be05c5).