An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491bf8f6062aa22f2e9b0e5b3b2167d0c45167d0c45167d0c45
Found host file through Apache traversal: 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 127.0.0.1 autoreply.server.qatarvoice.com 45.61.54.139 server.qatarvoice.com