
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-24901 is a critical vulnerability discovered in the Parse Server's Apple Game Center authentication adapter. The vulnerability was disclosed on May 4, 2022, affecting Parse Server versions below 4.10.10 and versions 5.0.0 to 5.2.1. The issue stems from improper validation of the Apple certificate URL in the authentication adapter (GitHub Advisory).
The vulnerability is characterized by weak validation of the Apple certificate URL in the Apple Game Center authentication adapter. It received a CVSS v3.1 Base Score of 7.5 (High), with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The attack vector is network-based, requires no privileges or user interaction, and has an unchanged scope (AttackerKB).
The vulnerability allows attackers to bypass authentication and potentially execute denial of service (DoS) attacks against the affected server. The impact primarily affects the system's availability, while confidentiality and integrity remain uncompromised (GitHub Advisory).
The vulnerability has been patched by improving the URL validation mechanism and implementing additional checks of the resource the URL points to before downloading it. Users should upgrade to Parse Server versions 4.10.10 or later (if using 4.x series) or version 5.2.1 or later (if using 5.x series) (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."