CVE-2024-11023

Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:firebase_javascript_sdk:*:*:*:*:*:*:*:*

History

23 Jul 2025, 19:38

Type Values Removed Values Added
CPE cpe:2.3:a:google:firebase_javascript_sdk:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 6.1
First Time Google firebase Javascript Sdk
Google
References () https://firebase.google.com/support/release-notes/js#version_1090_-_march_14_2024 - () https://firebase.google.com/support/release-notes/js#version_1090_-_march_14_2024 - Release Notes
References () https://github.com/firebase/firebase-js-sdk/pull/8056 - () https://github.com/firebase/firebase-js-sdk/pull/8056 - Issue Tracking, Patch

Information

Published : 2024-11-18 11:15

Updated : 2025-07-23 19:38


NVD link : CVE-2024-11023

Mitre link : CVE-2024-11023

CVE.ORG link : CVE-2024-11023


JSON object : View

Products Affected

google

  • firebase_javascript_sdk
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')