CVE-2024-47183: Parse Server's custom object ID allows to acquire role privileges
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.35331%
CWE
Published
10/4/2024
Updated
11/13/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| parse-server | npm | < 6.5.9 | 6.5.9 |
| parse-server | npm | >= 7.0.0, < 7.3.0 | 7.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key points: 1) The user creation endpoint (handleCreate in ClassesRouter) didn't prevent object IDs starting with 'role:' which are reserved for system roles. 2) The session authentication logic (getAuthForSessionToken in Auth.js) didn't invalidate existing sessions using these poisoned IDs. The commit diffs show added validation in both locations - object ID prefix check during user creation and session token validation - confirming these were the vulnerable points before patching.