提交 #752763: rachelos WeRSS WeRSS<=1.4.8 Pathname Traversal信息

标题rachelos WeRSS WeRSS<=1.4.8 Pathname Traversal
描述### Summary WeRSS(https://github.com/rachelos/we-mp-rss/)'s file download endpoint contains a path traversal vulnerability that allows authorized user to read sensitive files outside the intended application directory by crafting specially crafted HTTP requests. ## Detail https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655
来源⚠️ https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655
用户
 din4 (UID 50867)
提交2026-02-05 10時12分 (3 月前)
管理2026-02-08 09時32分 (3 days later)
状态已接受
VulDB条目344933 [rachelos WeRSS we-mp-rss 直到 1.4.8 apis/tools.py download_export_file filename 目录遍历]
积分16