CVE-2022-24901

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication in Parse Server's Apple Game Center adapter by exploiting improper URL validation of Apple certificates. Attackers can potentially gain unauthorized access or launch denial-of-service attacks. This affects any Parse Server deployment using the Apple Game Center authentication adapter.

💻 Affected Systems

Products:
  • parse-community/parse-server
Versions: Versions before 4.10.14 and 5.0.0-beta.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using the Apple Game Center authentication adapter. Other authentication methods are not impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete authentication bypass allowing unauthorized access to protected resources, potential data exposure, and server compromise leading to DoS.

🟠

Likely Case

Authentication bypass enabling unauthorized access to user accounts and protected API endpoints, potentially leading to data manipulation or extraction.

🟢

If Mitigated

Limited impact with proper network segmentation and authentication layers, though still vulnerable to targeted attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted requests to the Apple Game Center authentication endpoint. No authentication is needed to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.10.14 or 5.0.0-beta.1 and later

Vendor Advisory: https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr

Restart Required: Yes

Instructions:

1. Update Parse Server to version 4.10.14 or later. 2. For npm: 'npm update parse-server'. 3. Restart the Parse Server application. 4. Verify the update with 'npm list parse-server'.

🔧 Temporary Workarounds

Disable Apple Game Center Authentication

all

Temporarily disable the vulnerable authentication adapter until patching is possible

Modify Parse Server configuration to remove or disable Apple Game Center authentication

🧯 If You Can't Patch

  • Implement network-level restrictions to limit access to Parse Server authentication endpoints
  • Deploy a web application firewall (WAF) with rules to detect and block malicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check Parse Server version: if using Apple Game Center auth and version is below 4.10.14 or 5.0.0-beta.1, system is vulnerable.

Check Version:

npm list parse-server | grep parse-server

Verify Fix Applied:

Verify Parse Server version is 4.10.14 or later, or 5.0.0-beta.1 or later. Test Apple Game Center authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns from Apple Game Center endpoints
  • Failed authentication attempts with malformed certificate URLs
  • High volume of authentication requests to vulnerable endpoint

Network Indicators:

  • Unusual traffic patterns to /parse/users endpoint with Apple Game Center parameters
  • Requests containing malformed or suspicious certificate URLs

SIEM Query:

source="parse-server" AND (url="*users*" AND method="POST" AND params="*gameCenter*" AND response_status="200")

🔗 References

📤 Share & Export