Bug 1801919 (CVE-2020-6799) - CVE-2020-6799 Mozilla: Arbitrary code execution when opening pdf links from other applications, when Firefox is configured as default pdf reader
Summary: CVE-2020-6799 Mozilla: Arbitrary code execution when opening pdf links from o...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2020-6799
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1798927
TreeView+ depends on / blocked
 
Reported: 2020-02-11 22:42 UTC by Doran Moppert
Modified: 2021-02-16 20:35 UTC (History)
2 users (show)

Fixed In Version: firefox 68.5
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-02-11 22:43:16 UTC
Embargoed:


Attachments (Terms of Use)

Description Doran Moppert 2020-02-11 22:42:07 UTC
Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. 

*Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected.*



External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2020-06/#CVE-2020-6799

Comment 1 Doran Moppert 2020-02-11 22:42:11 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: Joshua Graham & Brendan Scarvell


Note You need to log in before you can comment on or make changes to this bug.