Arbitrary Argument Injection The advisory has been revoked - it doesn't affect any version of package MozillaFirefox-branding-upstream  (opens in a new tab)


Threat Intelligence

EPSS
0.47% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES151-MOZILLAFIREFOXBRANDINGUPSTREAM-2717179
  • published14 Apr 2022
  • disclosed17 Feb 2020

Introduced: 17 Feb 2020

CVE-2020-6799  (opens in a new tab)
CWE-88  (opens in a new tab)

Amendment

The SLES security team deemed this advisory irrelevant for SLES:15.1.

NVD Description

Note: Versions mentioned in the description apply only to the upstream MozillaFirefox-branding-upstream package and not the MozillaFirefox-branding-upstream package as distributed by SLES.

Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected. This vulnerability affects Firefox < 73 and Firefox < ESR68.5.