Multiple unspecified vulnerabilities in the Intuit QuickBooks Online Edition ActiveX control before 10 allow remote attackers to create or overwrite arbitrary files via unspecified arguments to the (1) httpGETToFile, (2) httpPOSTFromFile, and possibly other methods, probably involving path traversal vulnerabilities in exposed dangerous methods. NOTE: this can be leveraged for code execution by writing to a Startup folder.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/36464 | vdb entry |
http://www.kb.cert.org/vuls/id/979638 | patch third party advisory us government resource |
http://secunia.com/advisories/26659 | third party advisory |
http://osvdb.org/37134 | vdb entry |
http://www.securityfocus.com/bid/25544 | vdb entry |