{"api_version":"1","generated_at":"2026-04-23T09:36:56+00:00","cve":"CVE-2019-9802","urls":{"html":"https://cve.report/CVE-2019-9802","api":"https://cve.report/api/cve/CVE-2019-9802.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-9802","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-9802"},"summary":{"title":"CVE-2019-9802","description":"If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.","state":"PUBLIC","assigner":"security@mozilla.org","published_at":"2019-04-26 17:29:00","updated_at":"2021-07-21 11:39:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1415508","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1415508","refsource":"MISC","tags":["Issue Tracking","Vendor Advisory"],"title":"Access Denied","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mozilla.org/security/advisories/mfsa2019-07/","name":"https://www.mozilla.org/security/advisories/mfsa2019-07/","refsource":"MISC","tags":["Vendor Advisory"],"title":"Security vulnerabilities fixed in Firefox 66 — Mozilla","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-9802","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9802","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"9802","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"9802","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mozilla","cpe5":"firefox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-9802","qid":"371855","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for mozilla Multiple Vulnerabilities (05da6b56-3e66-4306-9ea3-89fafe939726)"}]},"source_records":{"cve_program":{"data_version":"4.0","references":{"reference_data":[{"url":"https://www.mozilla.org/security/advisories/mfsa2019-07/","refsource":"MISC","name":"https://www.mozilla.org/security/advisories/mfsa2019-07/"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1415508","refsource":"MISC","name":"https://bugzilla.mozilla.org/show_bug.cgi?id=1415508"}]},"description":{"description_data":[{"lang":"eng","value":"If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66."}]},"data_type":"CVE","affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"version":{"version_data":[{"version_affected":"<","version_value":"66"}]},"product_name":"Firefox"}]},"vendor_name":"Mozilla"}]}},"CVE_data_meta":{"ID":"CVE-2019-9802","ASSIGNER":"security@mozilla.org","STATE":"PUBLIC"},"data_format":"MITRE","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Chrome process information leak"}]}]}},"nvd":{"publishedDate":"2019-04-26 17:29:00","lastModifiedDate":"2021-07-21 11:39:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"66.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"9802","Ordinal":"147681","Title":"CVE-2019-9802","CVE":"CVE-2019-9802","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"9802","Ordinal":"1","NoteData":"If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"9802","Ordinal":"2","NoteData":"2019-04-26","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"9802","Ordinal":"3","NoteData":"2019-04-26","Type":"Other","Title":"Modified"}]}}}