CVE-2019-11707, CVE-2019-11708: Multiple Zero-Day Vulnerabilities in Mozilla Firefox Exploited in the Wild

Satnam Narang

Security researchers discover two zero-day vulnerabilities in Mozilla Firefox used in targeted attacks.

Editor’s Note: This blog was updated on June 20 to reflect additional information regarding a second vulnerability used in combination with CVE-2019-11707, as well as security updates from Mozilla. 

Background

On June 18 and June 20, the Mozilla Foundation published security advisories [1, 2] to address two zero-day vulnerabilities in Mozilla Firefox being used in targeted attacks in the wild.

Analysis

According to the first security advisory, CVE-2019-11707 is a type confusion vulnerability in Mozilla Firefox that can result in an exploitable crash due to issues in Array.pop which can occur when manipulating JavaScript objects. In the second security advisory, CVE-2019-11708 is a sandbox escape vulnerability in Prompt:Open Inter-process communication (IPC) messages due to insufficient vetting of parameters. An attacker could exploit this vulnerability to cause a non-sandboxed parent process to open web content from a compromised child process using a specially crafted Prompt:Open IPC message between the child and parent process. Combining both CVE-2019-11708 and CVE-2019-11707 can result in arbitrary code execution.

The vulnerabilities were reported to Mozilla by Google Project Zero’s Samuel Groß and the Coinbase Security team. 

Samuel Groß provided additional context about the vulnerability in Tweets posted on June 19. Groß mentions he did not have details about the active exploitation in the wild and that he reported the bug back in April. He noted that while remote code execution (RCE) is possible, it would “need a separate sandbox escape.” Finally, he did mention that on its own, the vulnerability “can also be exploited for Universal Cross-Site Scripting (UXSS) which might be enough depending on the attacker’s goals.”

Philip Martin, Chief Information Security Officer (CISO) at Coinbase, published a series of Tweets on June 20 providing additional context around the targeted attack. According to Martin, CVE-2019-11707 was used in conjunction with a separate Firefox zero-day sandbox escape vulnerability (CVE-2019-11708) to target Coinbase employees. Martin added that Coinbase wasn’t the only “crypto org” targeted in this attack campaign and his team has provided indicators of compromise (IOCs) to assist other organizations. 

Additionally, Patrick Wardle, Founder and Chief Research Officer (CRO) for Digita Security, published a blog analyzing a macOS malware sample sent to him that matches one of the malicious files referenced by Philip Martin in his Tweets.

Solution

Mozilla released Firefox 67.0.3 and Firefox Extended Support Release (ESR) 60.7.1 on June 18 to address CVE-2019-11707 and released Firefox 67.0.4 and Firefox ESR 60.7.2 on June 20 to address CVE-2019-11708. Users are advised to upgrade to the latest versions of Firefox as soon as possible.

Identifying affected systems

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface. Get a free 60-day trial of Tenable.io.

Read more >

Published on Jun 18, 2019

People also viewed

Senior Financial Analyst - Corporate Development

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Finance Finance
Your Role:Become a core member of Tenable’s internal corporate development team and assist with business, financial and valuation modeling for mergers, acquisitions and other strategic investments and initiatives.  Assist with evaluating elements ...

Cloud Security Intern

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Information Technology Internships
Your Role: The Cloud Security Intern will help Tenable secure their use of cloud systems across the company.  The intern will develop, implement and monitor security solutions for the cloud that assess risk, keeps Tenable data safe and bake in sec...

Salesforce Administrator

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Business Platforms Business Platforms
Your Role:Tenable Network Security is looking for a Salesforce.com Administrator to join our internal business platforms team. The qualified candidate will engage in the administration of Tenable’s  Salesforce.com instance, play a key role in the ...

Technical Support Intern

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Technical Support Internships
Your Role: The Technical Support Intern provides consistent, world-class security, network, and product support for specific Tenable products. In serving as the primary liaison between the company and customer, the Technical Support Intern resolve...

Research Intern - Plugin Automation

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Research Internships
Your Role: Tenable Research is looking for a Software Engineer Intern for the Plugin Automation team.  The position will involve developing frameworks for automated content creation, and processes for validating and publishing the content that is ...

Sales Development Manager

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Lead Generation Sales
Your Role:Tenable is looking for an experienced SDR Manager that will report to the Senior Director of Worldwide Sales Development and is responsible for ensuring the success of the Americas Tenable Sales Development team’s goals, as well as contr...

We have big plans for continued global growth, and we’re looking for people who are creative, flexible and dedicated to helping us build something great – something that matters.