CVE-2019-9812

Name
CVE-2019-9812
Description
Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Permissions Required https://bugzilla.mozilla.org/show_bug.cgi?id=1538008
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2019-27/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2019-25/
Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2019-26/
Permissions Required https://bugzilla.mozilla.org/show_bug.cgi?id=1538015

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* firefox >= None < 69.0
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* firefox_esr >= None < 60.9
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* firefox_esr >= 61.0 < 68.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status