Rule Category

BROWSER-FIREFOX -- Snort has detected traffic known to exploit vulnerabilities present in the Firefox browser, or products that have the "Gecko" engine (Thunderbird email client, etc.).

Alert Message

BROWSER-FIREFOX Mozilla Firefox RemotePrompt sandbox escape attempt

Rule Explanation

This event is generated when an attacker attempts to exploit a sandbox escape vulnerability in Mozilla Firefox. Impact: Attempted User Privilege Gain Details: This rule checks for attempts to exploit a sandbox escape vulnerability in Mozilla Firefox's RemotePrompt handler, which will allow the attacker to open additional web content in a privileged context. An attacker can exploit this vulnerability in combination with another Firefox vulnerability to achieve remote code execution on the victim's machine. Ease of Attack:

What To Look For

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic:

Technique:

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

CVE

Additional Links

Rule Vulnerability

CVE Additional Information

CVE-2019-11708
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer. This vulnerability affects Firefox ESR < 60.7.2, Firefox < 67.0.4, and Thunderbird < 60.7.2.
Details
Severity Base Score10.0
Impact Score6.0 Exploit Score3.9
Confidentiality ImpactHIGH Integrity ImpactHIGH
Availability ImpactHIGH Attack VectorNETWORK
ScopeCHANGED User InteractionNONE
Authentication Ease of AccessLOW
Privileges RequiredNONE