CVE-2019-11708

Published Jul 23, 2019

Last updated 4 months ago

Overview

Description
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
Source
security@mozilla.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
10
Impact score
6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
10
Impact score
10
Exploitability score
10
Vector string
AV:N/AC:L/Au:N/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability
Exploit added on
May 23, 2022
Exploit action due
Jun 13, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-20

Social media

Hype score
Not currently trending

Configurations