Mozilla Firefox/Thunderbird/Firefox ESR URI spoofing [CVE-2019-11717] – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on July 24th, 2019 📆 | 5200 Views ⚑


Mozilla Firefox/Thunderbird/Firefox ESR URI spoofing [CVE-2019-11717]

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability has been found in Mozilla Firefox, Thunderbird and Firefox ESR (Web Browser) (the affected version is unknown) and classified as critical. This vulnerability affects an unknown functionality of the component URI Handler. The manipulation with an unknown input leads to a spoofing vulnerability. The CWE definition for the vulnerability is CWE-290. As an impact it is known to affect confidentiality, integrity, and availability.

The weakness was released 07/23/2019. This vulnerability was named CVE-2019-11717 since 05/03/2019. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 07/23/2019).

Upgrading eliminates this vulnerability.

Entries connected to this vulnerability are available at 138498, 138494 and 138492.




VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0

VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Spoofing (CWE-290)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

05/03/2019 CVE assigned
07/23/2019 +81 days Advisory disclosed
07/23/2019 +0 days VulDB entry created
07/23/2019 +0 days VulDB last updateVendor:
CVE: CVE-2019-11717 (🔒)
See also: 🔒Created: 07/23/2019 09:43 PM
Complete: 🔍


No comments yet. Please log in to comment.

Enable the mail alert feature now!

Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *