exploit-db-mirror/exploits/windows/local/19993.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

6 lines
No EOL
483 B
Text

source: https://www.securityfocus.com/bid/1307/info
While using ICQmailclient, the user creates a temporary internet link created in a default temporary directory, which remains even after the user signs out or closes ICQ. This link may be re-opened by another user, thus giving them full access to the ICQmail webaccount.
The temporary link can be found in the default temp file (eg. c:\temp) and appears as:
http://cf.icq.com/cgi-bin/icqmail/write.pl5?uname=username&pwd=12345678