Description
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched.
Remediation
References
https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58
https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj
https://npmjs.com/parse-server
Related Vulnerabilities
CVE-2018-14041 Vulnerability in maven package org.webjars:bootstrap
CVE-2018-1000006 Vulnerability in maven package org.webjars.npm:electron
CVE-2022-21803 Vulnerability in maven package org.webjars.npm:nconf
CVE-2020-7789 Vulnerability in npm package node-notifier
CVE-2017-5656 Vulnerability in maven package org.apache.cxf:cxf-rt-ws-security