Sensitive Data Exposure in parse-server
Moderate severity
GitHub Reviewed
Published
Jul 11, 2019
in
parse-community/parse-server
•
Updated Jan 9, 2023
Description
Published to the GitHub Advisory Database
Jul 11, 2019
Reviewed
Jun 16, 2020
Last updated
Jan 9, 2023
Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking.
ParseError.ACCOUNT_ALREADY_LINKED(208)
was thrown BEFORE the AuthController checks the password and throws aParseError.SESSION_MISSING(206)
for Insufficient auth. An attacker can guess ids and get information about linked accounts/email addresses.For more information
If you have any questions or comments about this advisory,
Open an issue in the parse-server
Parse Community Vulnerability Disclosure Program
References