CVE-2020-6799Argument Injection in Mozilla Firefox

Severity
8.8HIGHNVD
EPSS
0.5%
top 35.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 2
Latest updateMay 24

Description

Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. No

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5mozilla/firefoxunspecified73+1
NVDmozilla/firefox< 73.0
NVDmozilla/firefox_esr< 68.5.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8h3q-5823-cjpv: Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types2022-05-24
CVEList
CVE-2020-6799: Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types2020-03-02

📋Vendor Advisories

4
Red Hat
Mozilla: Arbitrary code execution when opening pdf links from other applications, when Firefox is configured as default pdf reader2020-02-11
Debian
CVE-2020-6799: firefox - Command line arguments could have been injected during Firefox invocation as a s...2020
Mozilla
Mozilla Foundation Security Advisory 2020-06: CVE-2020-6799
Mozilla
Mozilla Foundation Security Advisory 2020-05: CVE-2020-6799

💬Community

1
Bugzilla
CVE-2020-6799 Mozilla: Arbitrary code execution when opening pdf links from other applications, when Firefox is configured as default pdf reader2020-02-11
CVE-2020-6799 — Argument Injection in Mozilla Firefox | cvebase