CVE-2019-9812 PUBLISHED

Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.

EPSS 0.52% · 66.6th percentile

Risk Scores

EPSS Score
0.52%
66.6th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSmozjs3838.8.0~repack1-0ubuntu4, 38.8.0~repack1-0ubuntu3, 38.8.0~repack1-0ubuntu1
Ubuntu:18.04:LTSmozjs5252.9.1-0ubuntu0.18.04.1, 52.8.1-0ubuntu0.18.04.1, 52.3.1-7fakesync1
Ubuntu:16.04:LTSfirefox46.0+build5-0ubuntu0.16.04.2, 46.0.1+build1-0ubuntu0.16.04.2, 47.0+build3-0ubuntu0.16.04.1
Ubuntu:20.04:LTSmozjs520, 52.9.1-1build1, 52.9.1-1ubuntu3
Ubuntu:18.04:LTSfirefox62.0+build2-0ubuntu0.18.04.5, 62.0.3+build1-0ubuntu0.18.04.1, 63.0+build2-0ubuntu0.18.04.2

Timeline

References

Open in Interactive Console →