Количество 2
Количество 2
CVE-2024-11023
Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0.
GHSA-3wf4-68gx-mph8
Firebase JavaScript SDK allows attackers to manipulate the "_authTokenSyncURL" to point to their own server
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-11023 Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0. | CVSS3: 6.1 | 0% Низкий | около 1 года назад | |
GHSA-3wf4-68gx-mph8 Firebase JavaScript SDK allows attackers to manipulate the "_authTokenSyncURL" to point to their own server | CVSS3: 5.3 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу