Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-26288
HistoryDec 30, 2020 - 7:25 p.m.

CVE-2020-26288 Parse Server stores password in plain text

2020-12-3019:25:17
CWE-312
GitHub_M
www.cve.org
4
parse server
cve-2020-26288
password storage
cleartext
ldap authentication

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

39.6%

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. It is an npm package “parse-server”. In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.

CNA Affected

[
  {
    "product": "parse-server",
    "vendor": "parse-community",
    "versions": [
      {
        "status": "affected",
        "version": "< 4.5.0"
      }
    ]
  }
]

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

39.6%

Related for CVELIST:CVE-2020-26288