Pickle "file" Parameter Handling Directory Traversal and File Disclosure Vulnerability
Description
A vulnerability has been identified in Pickle, which could be exploited by attackers to gain unauthorized access to arbitrary files on a vulnerable system. This issue is due to an input validation error in the "download.php" script that does not validate the "file" parameter, which could be exploited by malicious users to access and read the contents of arbitrary files.