Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3188 | Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0. |
Github GHSA |
GHSA-3wf4-68gx-mph8 | Firebase JavaScript SDK allows attackers to manipulate the "_authTokenSyncURL" to point to their own server |
Wed, 23 Jul 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google firebase Javascript Sdk |
|
| CPEs | cpe:2.3:a:google:firebase_javascript_sdk:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Google
Google firebase Javascript Sdk |
Mon, 18 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 18 Nov 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow am actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0. | Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0. |
Mon, 18 Nov 2024 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow am actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0. | |
| Title | Session Hijacking in Firebase JavaScript SDK | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-11-18T15:02:10.044Z
Reserved: 2024-11-08T13:51:36.349Z
Link: CVE-2024-11023
Updated: 2024-11-18T15:02:03.791Z
Status : Analyzed
Published: 2024-11-18T11:15:05.507
Modified: 2025-07-23T19:38:16.263
Link: CVE-2024-11023
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA