Sandbox escape vulnerability through Firefox Sync - CVE-2019-9812ID: oval:org.secpod.oval:def:58337 | Date: (C)2019-10-11 (M)2024-04-17 |
Class: VULNERABILITY | Family: windows |
Mozilla Firefox 69, Mozilla Firefox ESR 68.1 : Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com
in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2003 |
Microsoft Windows 8 |
Microsoft Windows XP |
Microsoft Windows Server 2008 |
Microsoft Windows Vista |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 10 |
Product: |
Mozilla Firefox |
Mozilla Firefox ESR |