CVE-2022-39225: parse-server's session object properties can be updated by foreign user if object ID is known
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.25568%
CWE
Published
9/21/2022
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| parse-server | npm | < 4.10.15 | 4.10.15 |
| parse-server | npm | >= 5.0.0, < 5.2.6 | 5.2.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient access control in session object handling. The commit diff shows the fix added a user ownership check to the query in RestWrite.js's handleSession method. Before the patch, there was no mechanism to ensure the requesting user matched the session's user field, allowing foreign session modification. The test case added in ParseSession.spec.js demonstrates this exploit scenario. The direct modification of write authorization logic in RestWrite.prototype.handleSession is the clear root cause.