exploit-db-mirror/exploits/windows/remote/26044.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

9 lines
No EOL
388 B
Text

source: https://www.securityfocus.com/bid/14400/info
MDaemon server is prone to a directory traversal vulnerability due to improper sanitization of user input.
Failure to sanitize the filename and path may result in compromise of the file system outside of the application's quarantine directory.
The following email attachment filename example was provided:
'../../../../../file.exe'