CVE-2009-3124
QuarkMail - Path Traversal via get_message.cgi tf Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2009-3124. PoCs published by Securitylab.ir.
AI-analyzed exploit summary This exploit demonstrates a directory traversal vulnerability in QuarkMail by manipulating the 'tf' parameter to access sensitive files like '/etc/passwd'. The attack leverages insufficient input sanitization in the 'get_message.cgi' script.
Description
Directory traversal vulnerability in get_message.cgi in QuarkMail allows remote attackers to read arbitrary files via a .. (dot dot) in the tf parameter.
Exploits (1)
This exploit demonstrates a directory traversal vulnerability in QuarkMail by manipulating the 'tf' parameter to access sensitive files like '/etc/passwd'. The attack leverages insufficient input sanitization in the 'get_message.cgi' script.