Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. firebase
  4. ›
  5. CVE-2024-11023

CVE-2024-11023: Firebase JavaScript SDK allows attackers to manipulate the "_authTokenSyncURL" to point to their own server

November 18, 2024

Firebase JavaScript SDK utilizes a “FIREBASE_DEFAULTS” cookie to store configuration data, including an “_authTokenSyncURL” field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the “_authTokenSyncURL” to point to their own server and it would allow am actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0.

References

  • firebase.google.com/support/release-notes/js
  • github.com/advisories/GHSA-3wf4-68gx-mph8
  • github.com/firebase/firebase-js-sdk
  • github.com/firebase/firebase-js-sdk/commit/245dd26e19b6c16aca7e1b7e597ed5784c2984ba
  • github.com/firebase/firebase-js-sdk/pull/8056
  • nvd.nist.gov/vuln/detail/CVE-2024-11023

Code Behaviors & Features

Detect and mitigate CVE-2024-11023 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 10.9.0

Fixed versions

  • 10.9.0

Solution

Upgrade to version 10.9.0 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

npm/firebase/CVE-2024-11023.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:40 +0000.