Antonio Davi Macedo Coelho de Castro

4 exploits Active since Mar 2020
CVE-2020-15270 WRITEUP MEDIUM WRITEUP
Parse Server - Info Disclosure
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched.
CVSS 4.3
CVE-2020-26288 WRITEUP HIGH WRITEUP
Parse Server <4.5.0 - Info Disclosure
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. It is an npm package "parse-server". In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
CVSS 7.7
CVE-2020-5251 WRITEUP HIGH WRITEUP
Parseplatform Parse-server < 4.1.0 - Incorrect Authorization
In parser-server before version 4.1.0, you can fetch all the users objects, by using regex in the NoSQL query. Using the NoSQL, you can use a regex on sessionToken and find valid accounts this way.
CVSS 7.7
CVE-2021-39187 WRITEUP HIGH WRITEUP
Parseplatform Parse-server < 4.10.3 - Improper Exception Handling
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.3, Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch. There is a patch for this issue in version 4.10.3. No workarounds aside from upgrading are known to exist.
CVSS 7.5