mozilla firefox CVE-2019-11708 vulnerability in Mozilla Products
Published on July 23, 2019

product logo product logo product logo
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.

Vendor Advisory Vendor Advisory Vendor Advisory NVD

Known Exploited Vulnerability

This Mozilla Firefox and Thunderbird Sandbox Escape Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution.

The following remediation steps are recommended / required by June 13, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2019-11708 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2019-11708

You can be notified by stack.watch whenever vulnerabilities like CVE-2019-11708 are published in these products:

 
 
 

What versions are vulnerable to CVE-2019-11708?