3 results (0.003 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow am actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0. Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. • https://firebase.google.com/support/release-notes/js#version_1090_-_march_14_2024 https://github.com/firebase/firebase-js-sdk/pull/8056 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

This vulnerability was a potential CSRF attack. When running the Firebase emulator suite, there is an export endpoint that is used normally to export data from running emulators. If a user was running the emulator and navigated to a malicious website with the exploit on a browser that allowed calls to localhost (ie Chrome before v94), the website could exfiltrate emulator data. We recommend upgrading past version 13.6.0 or commit  068a2b08dc308c7ab4b569617f5fc8821237e3a0 https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0 Esta vulnerabilidad era un posible ataque CSRF. Cuando se ejecuta el conjunto de emuladores de Firebase, hay un endpoint de exportación que se utiliza normalmente para exportar datos de emuladores en ejecución. • https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0 https://github.com/firebase/firebase-tools/pull/6944 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

Jerome Gamez Firebase Admin SDK for PHP version from 3.2.0 to 3.8.0 contains a Incorrect Access Control vulnerability in src/Firebase/Auth/IdTokenVerifier.php does not verify for token signature that can result in JWT with any email address and user ID could be forged from an actual token, or from thin air. This attack appear to be exploitable via Attacker would only need to know email address of the victim on most cases.. This vulnerability appears to have been fixed in 3.8.1. Jerome Gamez Firebase Admin SDK for PHP, de la versión 3.2.0 a la 3.8.0, contiene una vulnerabilidad de control de acceso incorrecto en src/Firebase/Auth/IdTokenVerifier.php, que no verifica la firma de tokens y que puede resultar en JWT con cualquier dirección de email e ID de usuario que pueda ser falsificado a partir de un token real o de la nada. Parece que el ataque puede ser explotado mediante un atacante que solo necesitaría saber la dirección de correo electrónico de la víctima en muchos casos. • https://github.com/kreait/firebase-php/pull/151 https://github.com/kreait/firebase-php/releases/tag/3.8.1 • CWE-732: Incorrect Permission Assignment for Critical Resource •