A compromised sandboxed content process can perform a Universal Cross-site Scripting (UXSS) attack on content from any site it can cause to be loaded in the same process. Because addons.mozilla.org and accounts.firefox.com have close ties to the Firefox product, malicious manipulation of these sites within the browser can potentially be used to modify a user's Firefox configuration. These two sites will now be isolated into their own process and not allowed to be loaded in a standard content process. This vulnerability affects Firefox < 69.
References
Link Resource
https://bugzilla.mozilla.org/show_bug.cgi?id=1539595 Issue Tracking Permissions Required Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2019-25/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mozilla

Published: 2019-09-27T17:18:39

Updated: 2019-09-27T17:18:39

Reserved: 2019-05-03T00:00:00


Link: CVE-2019-11741

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-09-27T18:15:11.867

Modified: 2019-10-02T17:31:48.873


Link: CVE-2019-11741

JSON object: View

cve-icon Redhat Information

No data.

CWE