If your application uses unisharp/laravel-filemanager , immediate action is required to secure your environment. UniSharp Laravel File Manager 2.0.0 - Exploit-DB
{{BaseURL}}/laravel-filemanager/download?working_dir=%2F../../../../../../etc&type=Files&file=passwd .
In versions of unisharp/laravel-filemanager before 2.6.4, the application failed to properly sanitize the working_dir parameter during download requests. An attacker could append directory traversal sequences—most commonly ../ —to the working_dir parameter to navigate outside the restricted file directory.
A remote attacker with even minimal privileges can gain access to all files readable by the user under which the application is running. This can lead to the retrieval of credentials for the currently logged-in user and other critical system configuration files. How the Attack Works