Vulnerability Details : CVE-2019-11708
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
Vulnerability category: Input validation
CVE-2019-11708
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution.
Added on
2022-05-23
Action due date
2022-06-13
Exploit prediction scoring system (EPSS) score for CVE-2019-11708
Probability of exploitation activity in the next 30 days: 0.82%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2019-11708
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
[email protected] |
10.0
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
[email protected] |
CWE ids for CVE-2019-11708
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: [email protected] (Primary)
References for CVE-2019-11708
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
Issue Tracking;Permissions Required;Vendor Advisory
-
https://www.mozilla.org/security/advisories/mfsa2019-19/
Vendor Advisory
- http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chain-Exploit.html
-
https://www.mozilla.org/security/advisories/mfsa2019-20/
Vendor Advisory
- https://security.gentoo.org/glsa/201908-12
Products affected by CVE-2019-11708
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*