Vulnerability Details : CVE-2012-2421
Absolute path traversal vulnerability in the intu-help-qb (aka Intuit Help System Async Pluggable Protocol) handlers in HelpAsyncPluggableProtocol.dll in Intuit QuickBooks 2009 through 2012, when Internet Explorer is used, might allow remote attackers to read arbitrary files in ZIP archives via a full pathname in the URI.
Vulnerability category: Directory traversal
Products affected by CVE-2012-2421
- cpe:2.3:a:intuit:quickbooks:2010:*:*:*:*:*:*:*When used together with: Microsoft » Internet Explorer
- cpe:2.3:a:intuit:quickbooks:2011:*:*:*:*:*:*:*When used together with: Microsoft » Internet Explorer
- cpe:2.3:a:intuit:quickbooks:2012:*:*:*:*:*:*:*When used together with: Microsoft » Internet Explorer
- cpe:2.3:a:intuit:quickbooks:2009:*:*:*:*:*:*:*When used together with: Microsoft » Internet Explorer
Exploit prediction scoring system (EPSS) score for CVE-2012-2421
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-2421
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.8
|
LOW | AV:A/AC:H/Au:N/C:P/I:N/A:N |
3.2
|
2.9
|
NIST |
CWE ids for CVE-2012-2421
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2421
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75172
QuickBooks Intuit Help System Async Pluggable Protocol information disclosure CVE-2012-2421 Vulnerability Report
-
http://www.kb.cert.org/vuls/id/232979
VU#232979 - Multiple vulnerabilities in Intuit QuickBooksUS Government Resource
-
http://www.securityfocus.com/archive/1/522139
SecurityFocus
Jump to