Quickbooks 2009 – Quickbooks 2012; in conjunction with Internet Explorer Versions 7-9
- The vulnerability described in this document can potentially be
code as the user viewing the malicious content.
- Intuit Help System Protocol File Retrieval:
- The vulnerability described in this document can be exploited by
which the user viewing the HTML has local or network file system
access. The attacker must know or guess the path and file name of the
target ZIP archive and the target file it contains. A further
significant limitation is that files in subdirectories inside of ZIP
archives have proven inaccessible, based on a sampling of Windows
ZIPs, Microsoft Office 2007 documents, JARs, and APKs.
No vendor response at the time of public release. More information with be posted has it becomes available.