In Tipask < 3.5.9, path parameters entered by the user are not validated when downloading attachments, a registered user can download arbitrary files on the Tipask server such as .env, /etc/passwd, laravel.log, causing infomation leakage.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41714.json"