// For flags

CVE-2019-9794

 

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability was discovered where specific command line arguments are not properly discarded during Firefox invocation as a shell handler for URLs. This could be used to retrieve and execute files whose location is supplied through these command line arguments if Firefox is configured as the default URI handler for a given URI scheme in third party applications and these applications insufficiently sanitize URL data. *Note: This issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

Fue encontrada una vulnerabilidad donde los argumentos específicos de la línea de comandos no se descartan correctamente durante la invocación de Firefox como un controlador shell para las URL. Esto podría usarse para recuperar y ejecutar archivos cuya ubicación es suministrada por medio de estos argumentos de la línea de comandos si Firefox es configurado como el controlador de URI por defecto para un esquema de URI especifico en aplicaciones de terceros y estas aplicaciones no sanean suficientemente los datos de URL. * Nota: Este problema solo impacta a los sistemas operativos de Windows. Otros sistemas operativos no se ven impactados. *. Esta vulnerabilidad impacta a Thunderbird anterior a la versión 60.6, Firefox ESR anterior a la versión 60.6 y Firefox anterior a la versión 66.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-03-14 CVE Reserved
  • 2019-04-26 CVE Published
  • 2024-04-19 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
< 66.0
Search vendor "Mozilla" for product "Firefox" and version " < 66.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
< 60.6.0
Search vendor "Mozilla" for product "Firefox Esr" and version " < 60.6.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
< 60.6.0
Search vendor "Mozilla" for product "Thunderbird" and version " < 60.6.0"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe