CVE-2019-9812

MEDIUM

Description

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

References

https://bugzilla.mozilla.org/show_bug.cgi?id=1538008

https://bugzilla.mozilla.org/show_bug.cgi?id=1538015

https://www.mozilla.org/security/advisories/mfsa2019-25/

https://www.mozilla.org/security/advisories/mfsa2019-26/

https://www.mozilla.org/security/advisories/mfsa2019-27/

Details

Source: MITRE

Published: 2020-01-08

Updated: 2020-01-13

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 9.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H

Impact Score: 5.8

Exploitability Score: 2.8

Severity: CRITICAL