{"id":"CVE-2019-9812","details":"Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR \u003c 60.9, Firefox ESR \u003c 68.1, and Firefox \u003c 69.","modified":"2026-04-16T04:39:54.555362994Z","published":"2020-01-08T22:15:13.310Z","related":["SUSE-SU-2019:14173-1","SUSE-SU-2019:14246-1","SUSE-SU-2019:2436-1","SUSE-SU-2019:2545-1","SUSE-SU-2019:2620-1","openSUSE-SU-2019:2251-1","openSUSE-SU-2019:2260-1","openSUSE-SU-2024:10600-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2019-25/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2019-26/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2019-27/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538008"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1538015"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9812.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"60.9"}]},{"events":[{"introduced":"0"},{"fixed":"69.0"}]},{"events":[{"introduced":"61.0"},{"fixed":"68.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H"}]}