CVE-2019-11708

KEV
Published: Lug 23, 2019 Last Modified: Ott 27, 2025
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 10,0
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: changed
Confidentiality: high
Integrity: high
Availability: high
HIGH 10,0
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,6889
Percentile
1,0th
Updated

EPSS Score Trend (Last 91 Days)

20

Improper Input Validation

Stable
Common Consequences
Security Scopes Affected:
Availability Confidentiality Integrity
Potential Impacts:
Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Read Memory Read Files Or Directories Modify Memory Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
View CWE Details
Exploit

Mozilla FireFox (Windows 10 x64) - Full Chain …

Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack

View Exploit Code →
Application

Firefox by Mozilla

Version Range Affected
To 60.7.2 (exclusive)
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Firefox by Mozilla

Version Range Affected
To 67.0.4 (exclusive)
cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Thunderbird by Mozilla

Version Range Affected
To 60.7.2 (exclusive)
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019…
http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chai…
https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
https://security.gentoo.org/glsa/201908-12
https://www.mozilla.org/security/advisories/mfsa2019-19/
https://www.mozilla.org/security/advisories/mfsa2019-20/
http://packetstormsecurity.com/files/155592/Mozilla-Firefox-Windows-64-Bit-Chai…
https://bugzilla.mozilla.org/show_bug.cgi?id=1559858
https://security.gentoo.org/glsa/201908-12
https://www.mozilla.org/security/advisories/mfsa2019-19/
https://www.mozilla.org/security/advisories/mfsa2019-20/