Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-9794


A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.


Published

2019-04-26T17:29:02.087

Last Modified

2024-11-21T04:52:19.360

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-88

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mozilla firefox < 66.0 Yes
Application mozilla firefox_esr < 60.6.0 Yes
Application mozilla thunderbird < 60.6.0 Yes
Operating System microsoft windows - No

References