GHSA-9prm-jqwx-45x9

Suggest an improvement
Source
https://github.com/advisories/GHSA-9prm-jqwx-45x9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-9prm-jqwx-45x9/GHSA-9prm-jqwx-45x9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-9prm-jqwx-45x9
Aliases
Published
2023-05-31T23:39:15Z
Modified
2023-12-06T01:03:01.864061Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Phishing attack vulnerability by uploading malicious HTML file
Details

Impact

Phishing attack vulnerability by uploading malicious files. A malicious user could upload a HTML file to Parse Server via its public API. That HTML file would then be accessible at the internet domain at which Parse Server is hosted. The URL of the the uploaded HTML could be shared for phishing attacks. The HTML page may seem legitimate because it is served under the internet domain where Parse Server is hosted, which may be the same as a company's official website domain.

An additional security issue arises when the Parse JavaScript SDK is used. The SDK stores sessions in the internet browser's local storage, which usually restricts data access depending on the internet domain. A malicious HTML file could contain a script that retrieves the user's session token from local storage and then share it with the attacker.

Patches

The fix adds a new Parse Server option fileUpload.fileExtensions to restrict file upload on Parse Server by file extension. It is recommended to restrict file upload for HTML file extensions, which this fix disables by default. If an app requires upload of files with HTML file extensions, the option can be set to ['.*'] or another custom value to override the default.

References

  • https://github.com/parse-community/parse-server/security/advisories/GHSA-9prm-jqwx-45x9
  • https://github.com/parse-community/parse-server/pull/8538 (Parse Server 6)
  • https://github.com/parse-community/parse-server/pull/8537 (Parse Server 5)
Database specific
{
    "nvd_published_at": "2023-05-30T18:15:10Z",
    "cwe_ids": [
        "CWE-434"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-05-31T23:39:15Z"
}
References

Affected packages

npm / parse-server

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.4

npm / parse-server

Package

Affected ranges

Type
SEMVER
Events
Introduced
6.0.0
Fixed
6.1.1