8.8
CVSSv3

CVE-2020-6799

Published: 02/03/2020 Updated: 01/01/2022
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected. This vulnerability affects Firefox < 73 and Firefox < ESR68.5.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

mozilla firefox_esr

Vendor Advisories

Mozilla Foundation Security Advisory 2020-06 Security Vulnerabilities fixed in Firefox ESR 685 Announced February 11, 2020 Impact high Products Firefox ESR Fixed in Firefox ESR 685 ...
Mozilla Foundation Security Advisory 2020-05 Security Vulnerabilities fixed in Firefox 73 Announced February 11, 2020 Impact high Products Firefox Fixed in Firefox 73 ...