Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR < 60.9, Firefox ESR < 68.1, and Firefox < 69.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 69.0 (excluding) |
Firefox | Mozilla | 61.0 (including) | 68.1 (excluding) |
Firefox_esr | Mozilla | * | 60.9 (excluding) |
Red Hat Enterprise Linux 6 | RedHat | firefox-0:60.9.0-1.el6_10 | * |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:60.9.0-1.el7_7 | * |
Red Hat Enterprise Linux 8 | RedHat | firefox-0:68.1.0-1.el8_0 | * |
Firefox | Ubuntu | bionic | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | disco | * |
Firefox | Ubuntu | eoan | * |
Firefox | Ubuntu | focal | * |
Firefox | Ubuntu | groovy | * |
Firefox | Ubuntu | hirsute | * |
Firefox | Ubuntu | impish | * |
Firefox | Ubuntu | jammy | * |
Firefox | Ubuntu | kinetic | * |
Firefox | Ubuntu | lunar | * |
Firefox | Ubuntu | mantic | * |
Firefox | Ubuntu | noble | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | xenial | * |
Mozjs38 | Ubuntu | bionic | * |
Mozjs38 | Ubuntu | esm-apps/bionic | * |
Mozjs38 | Ubuntu | upstream | * |
Mozjs52 | Ubuntu | bionic | * |
Mozjs52 | Ubuntu | disco | * |
Mozjs52 | Ubuntu | eoan | * |
Mozjs52 | Ubuntu | esm-apps/focal | * |
Mozjs52 | Ubuntu | esm-infra/bionic | * |
Mozjs52 | Ubuntu | focal | * |
Mozjs52 | Ubuntu | groovy | * |
Mozjs52 | Ubuntu | upstream | * |
Mozjs60 | Ubuntu | disco | * |
Mozjs60 | Ubuntu | eoan | * |
Mozjs60 | Ubuntu | upstream | * |