This vulnerability was a potential CSRF attack. When running the Firebase emulator suite, there is an export endpoint that is used normally to export data from running emulators. If a user was running the emulator and navigated to a malicious website with the exploit on a browser that allowed calls to localhost (ie Chrome before v94), the website could exfiltrate emulator data. We recommend upgrading past version 13.6.0 or commit 068a2b08dc308c7ab4b569617f5fc8821237e3a0 https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0
References
Configurations
History
22 Jul 2025, 21:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0 - Patch | |
References | () https://github.com/firebase/firebase-tools/pull/6944 - Patch | |
First Time |
Google firebase Command Line Interface
|
|
CPE | cpe:2.3:a:google:firebase_command_line_interface:*:*:*:*:*:*:*:* |
Information
Published : 2024-05-02 14:15
Updated : 2025-07-22 21:04
NVD link : CVE-2024-4128
Mitre link : CVE-2024-4128
CVE.ORG link : CVE-2024-4128
JSON object : View
Products Affected
- firebase_command_line_interface
CWE
CWE-352
Cross-Site Request Forgery (CSRF)