CVE-2008-0464
absofort aconon Mail Enterprise SQL - Path Traversal via Template Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2008-0464. PoCs published by Arno Toll.
AI-analyzed exploit summary The exploit demonstrates a directory traversal vulnerability in Aconon Mail's web interface, allowing remote attackers to read arbitrary files by manipulating the 'template' parameter in the archiv.cgi script. The PoC includes example URLs to fetch sensitive files like /etc/passwd.
Description
Directory traversal vulnerability in archiv.cgi in absofort aconon Mail 2007 Enterprise SQL 11.7.0 and Mail 2004 Enterprise SQL 11.5.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the template parameter.
Exploits (1)
The exploit demonstrates a directory traversal vulnerability in Aconon Mail's web interface, allowing remote attackers to read arbitrary files by manipulating the 'template' parameter in the archiv.cgi script. The PoC includes example URLs to fetch sensitive files like /etc/passwd.