A compromised sandboxed content process can perform a Universal Cross-site Scripting (UXSS) attack on content from any site it can cause to be loaded in the same process. Because addons.mozilla.org and accounts.firefox.com have close ties to the Firefox product, malicious manipulation of these sites within the browser can potentially be used to modify a user's Firefox configuration. These two sites will now be isolated into their own process and not allowed to be loaded in a standard content process. This vulnerability affects Firefox < 69.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1539595 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2019-25/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1539595 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2019-25/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1539595 - Issue Tracking, Permissions Required, Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2019-25/ - Vendor Advisory |
Information
Published : 2019-09-27 18:15
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11741
Mitre link : CVE-2019-11741
CVE.ORG link : CVE-2019-11741
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')