Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. parse-server
  4. ›
  5. GMS-2022-4384

GMS-2022-4384: Duplicate of ./npm/parse-server/CVE-2022-39231.yml

September 21, 2022

Impact

Validation of the authentication adapter app ID for Facebook and Spotify may be circumvented.

This fixes a vulnerability that affects configurations which allow users to authenticate using the Parse Server authentication adapter for Facebook or Spotify and where the server-side authentication adapter configuration appIds is set as a string (e.g. abc) instead of an array of strings (e.g. ["abc"]). The vulnerability makes it possible to authenticate requests which are coming from a Facebook or Spotify app with a different app ID than the one specified in the appIds configuration.

Both adapters still validate the access token with the respective authentication provider. An app ID is automatically assigned by the authentication provider. For this vulnerability to be exploited, an attacker would have to be assigned an app ID by the authentication provider which is a sub-set of the server-side configured app ID.

The documentation does not explicitly specify that the parameter appIds must be set as an array of strings and setting a string also worked. Therefore, there is a possibility that there are deployments where appIds is set as a string, making them vulnerable.

Patches

The fix makes Parse Server check the type of the value set for appIds and throws an error if the value is not an array.

Workarounds

No known workarounds.

References

  • GitHub advisory GHSA-r657-33vp-gp22

References

  • github.com/advisories/GHSA-r657-33vp-gp22
  • github.com/parse-community/parse-server/commit/8c8ec715739e0f851338cfed794409ebac66c51b
  • github.com/parse-community/parse-server/releases/tag/4.10.16
  • github.com/parse-community/parse-server/releases/tag/5.2.7
  • github.com/parse-community/parse-server/security/advisories/GHSA-r657-33vp-gp22

Code Behaviors & Features

Detect and mitigate GMS-2022-4384 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.10.16, all versions starting from 5.0.0 before 5.2.7

Fixed versions

  • 4.10.16
  • 5.2.7

Solution

Upgrade to versions 4.10.16, 5.2.7 or above.

Source file

npm/parse-server/GMS-2022-4384.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:18 +0000.