| 标题 | rachelos WeRSS WeRSS<=1.4.8 Pathname Traversal |
|---|
| 描述 | ### Summary
WeRSS(https://github.com/rachelos/we-mp-rss/)'s file download endpoint contains a path traversal vulnerability that allows authorized user to read sensitive files outside the intended application directory by crafting specially crafted HTTP requests.
## Detail
https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| 来源 | ⚠️ https://www.notion.so/WeRSS-Path-Traversal-Vulnerability-Leads-to-Arbitrary-File-Read-2feea92a3c41804da1f1f5ddbf86e655 |
|---|
| 用户 | din4 (UID 50867) |
|---|
| 提交 | 2026-02-05 10時12分 (3 月前) |
|---|
| 管理 | 2026-02-08 09時32分 (3 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 344933 [rachelos WeRSS we-mp-rss 直到 1.4.8 apis/tools.py download_export_file filename 目录遍历] |
|---|
| 积分 | 16 |
|---|