{"vulnerability": "CVE-2024-11023", "sightings": [{"uuid": "e5fe2e3c-9e7c-4633-832b-2d9b72e01a86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11023", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113503493348466581", "content": "", "creation_timestamp": "2024-11-18T10:31:03.302105Z"}, {"uuid": "24006ff9-d22a-40d7-971f-093e135b0e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11023", "type": "seen", "source": "https://t.me/cvedetector/11325", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-11023 - Firebase JavaScript SDK Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2024-11023 \nPublished : Nov. 18, 2024, 11:15 a.m. | 37\u00a0minutes ago \nDescription : Firebase JavaScript SDK utilizes a \"FIREBASE_DEFAULTS\" cookie to store configuration data, including an \"_authTokenSyncURL\" field used for session synchronization.  If this cookie field is preset via an attacker by any other method, the attacker can manipulate the \"_authTokenSyncURL\" to point to their own server and it would allow am actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T13:12:21.000000Z"}, {"uuid": "80551020-d062-459e-a7f6-750bbb9473b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-11023", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:29.000000Z"}]}