OS Command Injection in Mozilla Firefox and Firefox ESR - CVE-2020-6799

 

OS Command Injection in Mozilla Firefox and Firefox ESR - CVE-2020-6799

Published: February 11, 2020


Vulnerability identifier: #VU25123
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-6799
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Mozilla
Affected software:
Mozilla Firefox
Firefox ESR

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when opening PDF links from other applications and Firefox is configured as a default PDF reader. A remote unauthenticated attacker can trick the victim into clicking on a specially crafted link and execute arbitrary OS commands on the system.

Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected.


How to mitigate CVE-2020-6799

Install updates from vendor's website.

Sources