File handled properly:
1. Download the file format is not verified;
2. The path of the request is not restricted;
Will file download vulnerability, resulting in system configuration files, script files and other information is downloaded, thus divulge important information