A comprehensive security analysis has revealed that over 150 popular mobile applications are inadvertently exposing sensitive user data through misconfigured Google Firebase services, affecting apps with download counts ranging from 100,000 to over 100 million users worldwide.
Scale of the Firebase Security Crisis
Security researcher Icex0 conducted an extensive audit of approximately 1,200 mobile applications across three major app categories, discovering that roughly 80% utilize Firebase services in some capacity.
Among these Firebase-enabled applications, around 150 were found to have improperly configured security rules that allow unauthenticated access to critical data repositories.
The exposed information encompasses a broad spectrum of sensitive data, including payment details, user credentials, private messages, cleartext passwords, location coordinates, GitHub tokens, AWS access keys with root privileges, and millions of user identification records.
One particularly concerning case involved an application with over 100 million downloads that stored government-issued ID photos, accessible without any authentication requirements.
The security flaws primarily stem from four Firebase services: Realtime Databases, Cloud Storage Buckets, Firestore databases, and Remote Configuration services.
These vulnerabilities occur when developers implement Firebase services in “test mode” or configure overly permissive security rules that persist beyond the intended development phase.
Technical Root Causes and Detection Methods
The widespread exposure results from developers selecting Firebase’s test mode during initial setup, which grants public read and write access for 30 days.
Many developers either forget to implement proper security rules after this period or extend the permissive configuration rather than implement authentication requirements.
To address these detection gaps, the researcher developed OpenFirebase, an automated security scanner that comprehensively analyzes Android Package Kit (APK) files to identify vulnerable Firebase configurations.
Unlike existing tools that typically check only a single service or format, OpenFirebase examines multiple Firebase services across various URL formats and permission levels.
The tool extracts Firebase project identifiers, Google API keys, and application identifiers directly from APK files, then systematically tests for unauthorized access across all identified services.
For Firebase Storage, it checks both legacy appspot.com domains and newer firebasestorage.app formats. Real-time database scanning encompasses multiple regional domains and both legacy and modern URL structures.
Remote Configuration analysis proves particularly valuable for discovering exposed secrets, as these services often contain hardcoded API keys, database credentials, and access tokens that developers mistakenly believe are secure.
The researcher discovered numerous instances of exposed OpenAI API keys, AWS root account credentials, and GitHub tokens with full repository access.
The analysis reveals that existing Firebase security tools overlook significant vulnerabilities due to their limited scope, which checks only single services or URL formats. This comprehensive approach uncovered substantially more exposed services than traditional scanning methods.
The researcher emphasizes that while Firebase Remote Configurations are designed to be publicly accessible, they become security risks when developers store sensitive credentials within them, highlighting the need for better security awareness and automated detection tools.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates