This Metasploit module exploits a directory traversal vulnerability present in the _list_file_get() function of Majordomo2 (help function). By default, this module will attempt to download the Majordomo config.pl file.
c4bb2d4ebd4a9e75580f9a5cc2da62b253b9f33f3649f38afc2598aee8c2d9c1
Majordomo2 suffers from a directory traversal vulnerability in the help command. The parameter named extra is not properly sanitized. Versions 20110203 and below are affected.
a56132a9257c31bde8e4caffddc1080e11f6ed79939595cb7bcf42ff440d659b