CVE-2009-3124

QuarkMail - Path Traversal via get_message.cgi tf Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3124. PoCs published by Securitylab.ir.

AI-analyzed exploit summary This exploit demonstrates a directory traversal vulnerability in QuarkMail by manipulating the 'tf' parameter to access sensitive files like '/etc/passwd'. The attack leverages insufficient input sanitization in the 'get_message.cgi' script.

Description

Directory traversal vulnerability in get_message.cgi in QuarkMail allows remote attackers to read arbitrary files via a .. (dot dot) in the tf parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Securitylab.ir · textwebappsphp
https://www.exploit-db.com/exploits/34875

This exploit demonstrates a directory traversal vulnerability in QuarkMail by manipulating the 'tf' parameter to access sensitive files like '/etc/passwd'. The attack leverages insufficient input sanitization in the 'get_message.cgi' script.

Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target: QuarkMail (version not specified)
No auth needed
Prerequisites: Access to the vulnerable QuarkMail web interface
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (2)

Core 2
Core References
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/2460
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.org/0908-exploits/quarkmail-lfi.txt

Scores

EPSS 0.0158
EPSS Percentile 81.8%

Details

CWE
CWE-22
Status published
Products (1)
ipmotor/quarkmail
Published Sep 09, 2009
Tracked Since Feb 18, 2026