CVE-2020-6799
NixOS vulnerability analysis and mitigation

Overview

CVE-2020-6799 is a command line argument injection vulnerability discovered in Mozilla Firefox versions prior to 73.0 and Firefox ESR versions prior to 68.5. The vulnerability occurs when Firefox is configured as the default handler for certain unsupported file types on Windows operating systems. When a file is opened in a third-party application that insufficiently sanitizes URL data, clicking a link in that application could be used to retrieve and execute files through injected command line arguments (NVD, Mozilla Advisory).

Technical details

The vulnerability stems from Firefox's handling of shell associations for non-default file types. When Firefox is configured as the default handler for a file type through Windows' 'Open With' dialog, the command line arguments could be injected during Firefox invocation. This occurs because the file handler registration lacks proper command line argument sanitization, specifically missing the '-osint' flag that would prevent argument injection. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H (NVD).

Impact

If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code on the target system with the privileges of the Firefox process. The attack requires user interaction in the form of clicking a link in a third-party application, and the vulnerability only affects Windows systems where Firefox is configured as the default handler for non-default file types (NVD, Threatpost).

Mitigation and workarounds

The vulnerability was fixed in Firefox version 73.0 and Firefox ESR version 68.5. Users are advised to upgrade to these or later versions. For Gentoo Linux users, the fix is available in www-client/firefox-68.6.0 and www-client/firefox-bin-68.6.0 (Gentoo Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management