CVE-2024-4128

This vulnerability was a potential CSRF attack. When running the Firebase emulator suite, there is an export endpoint that is used normally to export data from running emulators. If a user was running the emulator and navigated to a malicious website with the exploit on a browser that allowed calls to localhost (ie Chrome before v94), the website could exfiltrate emulator data. We recommend upgrading past version 13.6.0 or commit  068a2b08dc308c7ab4b569617f5fc8821237e3a0 https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0
Configurations

No configuration.

History

21 Nov 2024, 09:42

Type Values Removed Values Added
References () https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0 - () https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0 -
References () https://github.com/firebase/firebase-tools/pull/6944 - () https://github.com/firebase/firebase-tools/pull/6944 -
Summary
  • (es) Esta vulnerabilidad era un posible ataque CSRF. Cuando se ejecuta el conjunto de emuladores de Firebase, hay un endpoint de exportación que se utiliza normalmente para exportar datos de emuladores en ejecución. Si un usuario estaba ejecutando el emulador y navegaba a un sitio web malicioso con el exploit en un navegador que permitía llamadas al host local (es decir, Chrome antes de v94), el sitio web podría filtrar datos del emulador. Recomendamos actualizar la versión anterior 13.6.0 o confirmar 068a2b08dc308c7ab4b569617f5fc8821237e3a0 https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0

02 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-02 14:15

Updated : 2024-11-21 09:42


NVD link : CVE-2024-4128

Mitre link : CVE-2024-4128

CVE.ORG link : CVE-2024-4128


JSON object : View

Products Affected

No product.

CWE
CWE-352

Cross-Site Request Forgery (CSRF)