Loading HuntDB...

GHSA-8xq9-g7ch-35hg

GitHub Security Advisory

Parse Server's custom object ID allows to acquire role privileges

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact

If the Parse Server option `allowCustomObjectId: true` is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role.

### Patches

Improved validation for custom user object IDs. Session tokens for existing users with an object ID that exploits the vulnerability are now rejected.

### Workarounds

- Disable custom object IDs by setting `allowCustomObjectId: false` or not setting the option which defaults to `false`.
- Use a Cloud Code Trigger to validate that a new user's object ID doesn't start with the prefix `role:`.

### References

- https://github.com/parse-community/parse-server/security/advisories/GHSA-8xq9-g7ch-35hg
- https://github.com/parse-community/parse-server/pull/9317 (fix for Parse Server 7)
- https://github.com/parse-community/parse-server/pull/9318 (fix for Parse Server 6)

Affected Packages

npm parse-server
Affected versions: 0 (fixed in 6.5.9)
npm parse-server
Affected versions: 7.0.0 (fixed in 7.3.0)

Related CVEs

Key Information

GHSA ID
GHSA-8xq9-g7ch-35hg
Published
October 4, 2024 6:50 PM
Last Modified
October 4, 2024 6:50 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
parse-server
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 7, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.