Description
Parse Server (npm package parse-server) broadcasts events to all clients without checking if the session token is valid. This allows clients with expired sessions to still receive subscription objects. It is not possible to create subscription objects with invalid session tokens. The issue is not patched.
Remediation
References
https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58
https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj
https://npmjs.com/parse-server
Related Vulnerabilities
CVE-2022-35980 Vulnerability in maven package org.opensearch.plugin:opensearch-security
CVE-2022-24762 Vulnerability in npm package sysend
CVE-2022-23540 Vulnerability in maven package org.webjars.npm:jsonwebtoken
CVE-2021-21421 Vulnerability in npm package node-etsy-client
CVE-2020-5289 Vulnerability in maven package com.yahoo.elide:elide-core