Bug 1801919 (CVE-2020-6799) - CVE-2020-6799 Mozilla: Arbitrary code execution when opening pdf links from other applications, when Firefox is configured as default pdf reader
Summary: CVE-2020-6799 Mozilla: Arbitrary code execution when opening pdf links from o...
Alias: CVE-2020-6799
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
Blocks: 1798927
TreeView+ depends on / blocked
Reported: 2020-02-11 22:42 UTC by Doran Moppert
Modified: 2021-02-16 20:35 UTC (History)
2 users (show)

Fixed In Version: firefox 68.5
Doc Type: No Doc Update
Doc Text:
Clone Of:
Last Closed: 2020-02-11 22:43:16 UTC

Attachments (Terms of Use)

Description Doran Moppert 2020-02-11 22:42:07 UTC
Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. 

*Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected.*

External Reference:


Comment 1 Doran Moppert 2020-02-11 22:42:11 UTC

Name: the Mozilla project
Upstream: Joshua Graham & Brendan Scarvell

Note You need to log in before you can comment on or make changes to this bug.