-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - firebase-10.6.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Vulnerabilities
Vulnerability | Severity | Dependency | Type | Fixed in (firebase version) | Remediation Possible** | |
---|---|---|---|---|---|---|
CVE-2024-37168 | 5.3 | grpc-js-1.9.11.tgz | Transitive | 10.7.0-20231112213030 | ❌ | |
CVE-2024-11023 | 5.3 | detected in multiple dependencies | Transitive | 10.7.0-canary.0ecaf6c9f | ❌ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-37168
Vulnerable Library - grpc-js-1.9.11.tgz
Library home page: https://registry.npmjs.org/@grpc/grpc-js/-/grpc-js-1.9.11.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- firebase-10.6.0.tgz (Root Library)
- firestore-4.3.2.tgz
- ❌ grpc-js-1.9.11.tgz (Vulnerable Library)
- firestore-4.3.2.tgz
Found in base branch: main
Vulnerability Details
@grpc/grps-js implements the core functionality of gRPC purely in JavaScript, without a C++ addon. Prior to versions 1.10.9, 1.9.15, and 1.8.22, there are two separate code paths in which memory can be allocated per message in excess of the grpc.max_receive_message_length
channel option: If an incoming message has a size on the wire greater than the configured limit, the entire message is buffered before it is discarded; and/or if an incoming message has a size within the limit on the wire but decompresses to a size greater than the limit, the entire message is decompressed into memory, and on the server is not discarded. This has been patched in versions 1.10.9, 1.9.15, and 1.8.22.
Mend Note: The description of this vulnerability differs from MITRE.
Publish Date: 2024-06-10
URL: CVE-2024-37168
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Origin: GHSA-7v5v-9h63-cj86
Release Date: 2024-06-10
Fix Resolution (@grpc/grpc-js): 1.9.15
Direct dependency fix Resolution (firebase): 10.7.0-20231112213030
Step up your Open Source Security Game with Mend here
CVE-2024-11023
Vulnerable Libraries - auth-1.4.0.tgz, firebase-10.6.0.tgz
auth-1.4.0.tgz
Library home page: https://registry.npmjs.org/@firebase/auth/-/auth-1.4.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- firebase-10.6.0.tgz (Root Library)
- ❌ auth-1.4.0.tgz (Vulnerable Library)
firebase-10.6.0.tgz
Library home page: https://registry.npmjs.org/firebase/-/firebase-10.6.0.tgz
Path to dependency file: /package.json
Path to vulnerable library: /package.json
Dependency Hierarchy:
- ❌ firebase-10.6.0.tgz (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0.
Publish Date: 2024-11-18
URL: CVE-2024-11023
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Release Date: 2024-11-18
Fix Resolution (@firebase/auth): 1.6.1-20240227144051
Direct dependency fix Resolution (firebase): 10.7.0-canary.0ecaf6c9f
Step up your Open Source Security Game with Mend here