Vulnerability Details : CVE-2019-11733
When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox < 68.0.2 and Firefox ESR < 68.0.2.
Vulnerability category: BypassGain privilege
Products affected by CVE-2019-11733
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-11733
0.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-11733
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2019-11733
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-11733
-
https://www.mozilla.org/security/advisories/mfsa2019-24/
Stored passwords in 'Saved Logins' can be copied without master password entry — MozillaVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
[security-announce] openSUSE-SU-2019:2251-1: important: Security update
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1565780
Access DeniedIssue Tracking;Permissions Required;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
[security-announce] openSUSE-SU-2019:2260-1: important: Security update
Jump to