{"uuid": "b0b188ac-cfb2-4e32-930f-ed4be681270c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55658", "type": "seen", "source": "https://t.me/cvedetector/12674", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55658 - SiYuan File Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55658 \nPublished : Dec. 12, 2024, 2:15 a.m. | 27\u00a0minutes ago \nDescription : SiYuan is a personal knowledge management system. Prior to version 3.1.16, SiYuan's /api/export/exportResources endpoint is vulnerable to arbitary file read via path traversal. It is possible to manipulate the paths parameter to access and download arbitrary files from the host system by traversing the workspace directory structure. Version 3.1.16 contains a patch for the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-12T03:46:58.000000Z"}