If the Parse Server option allowCustomObjectId: true
is set, an attacker that is allowed to create a new user can set a custom object ID for that new user that exploits the vulnerability and acquires privileges of a specific role.
Improved validation for custom user object IDs. Session tokens for existing users with an object ID that exploits the vulnerability are now rejected.
allowCustomObjectId: false
or not setting the option which defaults to false
.role:
.{ "nvd_published_at": "2024-10-04T15:15:13Z", "cwe_ids": [ "CWE-285", "CWE-863" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-10-04T18:50:56Z" }