Skip to content

FireSploit is a powerful tool for ethical hackers, developers, and security researchers. It helps find and fix misconfigured Firebase databases that are exposing sensitive data to the public. By scanning for open read/write access, it helps you secure your applications and prevent data breaches.

License

Notifications You must be signed in to change notification settings

secshubhamsharma/FireSploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔥 FireSploit 🔥

A powerful Firebase misconfiguration scanner and exploitation tool for ethical hackers, developers, and security researchers.


Table of Contents


About the Vulnerability

Let me take you through a real problem that's been silently affection thousand of apps across the world, Firebase a super handy easy to implement backend service that lets your app store and sync data in real-time.

The problem lies when you set security rules

{
  "rules": {
    ".read": true,
    ".write": true
  }
}

This security rules means anyone on the internet can read, write and exfiltrate entire database without authentication

In 2018, researchers at Appthority and various independent security analysts (including bug bounty hunters) discovered that over 28,000 Firebase apps were publicly exposing sensitive data due to incorrect security rules.

What FireSploit Does

Scans a Firebase database endpoint for:

  • .read misconfiguration (public access)
  • .write misconfiguration (unauthorized data injection)

Exploits the database (optional):

  • Reads and prints live data
  • Injects a harmless payload to simulate attack

Demo

Screenshot 2025-07-06 at 11 53 48 PM

Installation

git clone https://github.com/secshubhamsharma/FireSploit.git
cd FireSploit
pip install -r requirements.txt

Usage

# Scan a single Firebase instance
python3 firesploit.py --url https://yourproject.firebaseio.com

# Scan multiple targets from a file
python3 firesploit.py --file firebase_targets.txt

# Save results to a file
python3 firesploit.py --file firebase_targets.txt --output report.txt

If .read access is open:

  • It Dumps publicly accessible data

If .write access is open:

  • It offers to inject a safe payload
{
 "pwned_by": "FireSploit",
 "status": "vulnerable",
 "timestamp": "2025-07-04"
}

Project Structure

FireSploit/
├── firesploit.py          # Main scanner and exploit tool
├── requirements.txt       # Python dependencies
├── README.md              # Project documentation
└── LICENSE                # MIT License file

Best Practices

To secure your Firebase Realtime Database and prevent exploitation by tools like FireSploit, follow these guidelines:

  • Implement Proper Firebase Security Rules
  • Use strict .read and .write conditions:
 "rules": {
   ".read": "auth != null",
   ".write": "auth != null"
 }
}
  • Avoid Setting Rules to true

Legal Disclaimer

This project is intended for educational and authorized testing purposes only.
Unauthorized access to Firebase projects that you don’t own or control is illegal and unethical.
The creator of FireSploit is not responsible for misuse of this tool.

Contributing

Want to improve FireSploit? Contributions are welcome!

Author

Shubham Sharma

Support

If you found this tool helpful Then ⭐ star the repo and share it with others in the infosec community!

License

This project is licensed under the MIT License – see the LICENSE file for details.

About

FireSploit is a powerful tool for ethical hackers, developers, and security researchers. It helps find and fix misconfigured Firebase databases that are exposing sensitive data to the public. By scanning for open read/write access, it helps you secure your applications and prevent data breaches.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages