Path traversal in flaskcode
        
  High severity
        
          GitHub Reviewed
      
        Published
          Jan 13, 2024 
          to the GitHub Advisory Database
          •
          Updated Jan 24, 2024 
      
  
Description
        Published by the National Vulnerability Database
      Jan 13, 2024 
    
  
        Published to the GitHub Advisory Database
      Jan 13, 2024 
    
  
        Reviewed
      Jan 24, 2024 
    
  
        Last updated
      Jan 24, 2024 
    
  
An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a GET request to a /resource-data/<file_path>.txt URI (from views.py), allows attackers to read arbitrary files.
References