## https://sploitus.com/exploit?id=D5824310-6AA6-52E1-B2AB-81C7ED05DBB0
# Icewarp Email Server 12.3.0.1 unlimited_file_upload
https://nvd.nist.gov/vuln/detail/CVE-2020-14065
## Introduction :
### first step: login to your account and then change your profile picture.
### second step: send request to intruder, and add posiotion like below.

### third step: send request to intruder, and add posiotion like below.

### forth step: start attack.
result: Look at the responses, as you can see all of files has been uploaded and you can access the file. the file upload location pattern is "upload_date-folder(random number)/file(random number)" Look at below image.
