Loading HuntDB...

GHSA-fcv6-fg5r-jm9q

GitHub Security Advisory

Trigger `beforeFind` not invoked in internal query pipeline when fetching pointer

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact

A Parse Pointer can be used to access internal Parse Server classes. It can also be used to circumvent the `beforeFind` query trigger which can be an additional vulnerability for deployments where the `beforeFind` trigger is used as a security layer to modify an incoming query.

### Patches

The vulnerability was fixed by implementing a patch in the internal query pipeline to prevent a Parse Pointer to be used to access internal Parse Server classes or circumvent the `beforeFind` trigger.

### Workarounds

There is no known workaround to prevent a Parse Pointer to be used to access internal Parse Server classes. A workaround if a `beforeFind` trigger is used as a security layer is to instead use the Parse Server provided [security layers](https://docs.parseplatform.org/parse-server/guide/#security) to manage access levels with Class-Level Permissions and Object-Level Access Control.

### References

- GitHub security advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-fcv6-fg5r-jm9q
- Patched in Parse Server 6.x: https://github.com/parse-community/parse-server/releases/tag/6.2.2
- Patched in Parse Server 5.x (LTS): https://github.com/parse-community/parse-server/releases/tag/5.5.5

Affected Packages

npm parse-server
Affected versions: 1.0.0 (fixed in 5.5.5)
npm parse-server
Affected versions: 6.0.0 (fixed in 6.2.2)

Related CVEs

Key Information

GHSA ID
GHSA-fcv6-fg5r-jm9q
Published
September 4, 2023 10:40 PM
Last Modified
September 4, 2023 10:40 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
parse-server
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 12, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.