{ "schema_version": "1.4.0", "id": "GHSA-9v7f-rj28-9x3v", "modified": "2022-06-04T00:00:51Z", "published": "2022-05-24T00:01:35Z", "aliases": [ "CVE-2021-41714" ], "details": "In Tipask < 3.5.9, path parameters entered by the user are not validated when downloading attachments, a registered user can download arbitrary files on the Tipask server such as .env, /etc/passwd, laravel.log, causing infomation leakage.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41714" }, { "type": "WEB", "url": "https://github.com/sdfsky/tipask/commit/9b5f13d1708e9a5dc0959cb8a97be1c32b94ca69" }, { "type": "WEB", "url": "https://github.com/sdfsky/tipask/blob/c4e6aa9f6017c9664780570016954c0922d203b7/app/Http/Controllers/AttachController.php#L42" }, { "type": "WEB", "url": "https://www.yuque.com/henry-weply/penetration/fza5hm" } ], "database_specific": { "cwe_ids": [ "CWE-494" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-05-23T16:16:00Z" } }