Directory traversal vulnerability in the zip download functionality in QuiXplorer before 2.5.5 allows remote attackers to read arbitrary files via a … (dot dot) in the selitems[] parameter in a download_selected action to index.php.
secunia.com/advisories/55725
exchange.xforce.ibmcloud.com/vulnerabilities/89059
github.com/realtimeprojects/quixplorer
github.com/realtimeprojects/quixplorer/blob/v2.5.5/doc/RELEASES.md
github.com/realtimeprojects/quixplorer/commit/7ac119cebd3b6bfe16a30fd1d5290127310a4436
www3.trustwave.com/spiderlabs/advisories/TWSL2013-030.txt