CVE-2024-30564

9.8 CRITICAL

📋 TL;DR

This vulnerability in the nora-firebase-common library allows remote attackers to execute arbitrary code by sending a crafted script to the updateState parameter. It affects all applications using versions 1.0.41 through 1.12.2 of this Firebase integration library.

💻 Affected Systems

Products:
  • andrei-tatar/nora-firebase-common
Versions: v1.0.41 through v1.12.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using the vulnerable library with the updateStateInternal method exposed is affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected server, allowing data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to application compromise, data exfiltration, and potential ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation and least privilege controls, potentially containing the breach to the affected application.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a widely used Firebase library and exploitation requires minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.12.3 and later

Vendor Advisory: https://github.com/andrei-tatar/nora-firebase-common/commit/bf30b75d51be04f6c1f884561a223226c890f01b

Restart Required: Yes

Instructions:

1. Update nora-firebase-common to v1.12.3 or later using npm update nora-firebase-common. 2. Restart all affected applications. 3. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation

all

Implement strict input validation for the updateState parameter to reject any script-like content.

Network Restriction

all

Restrict network access to the affected endpoint using firewall rules or application-level controls.

🧯 If You Can't Patch

  • Isolate the affected system from critical networks and implement strict network segmentation.
  • Implement Web Application Firewall (WAF) rules to block malicious payloads targeting the updateState parameter.

🔍 How to Verify

Check if Vulnerable:

Check package.json or node_modules for nora-firebase-common version between 1.0.41 and 1.12.2.

Check Version:

npm list nora-firebase-common

Verify Fix Applied:

Verify nora-firebase-common version is 1.12.3 or later and test the updateState functionality with safe inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script execution in application logs
  • Errors from updateStateInternal method
  • Unexpected process spawns

Network Indicators:

  • HTTP requests with script content in updateState parameter
  • Unusual outbound connections from the application server

SIEM Query:

source="application.log" AND "updateState" AND (script OR eval OR exec)

🔗 References

📤 Share & Export