An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07d090755073d8ada260862fa8cbfd06a474ae8f9c3
Found host file trough Directory traversal: # $freebsd$ # # host database # # this file should contain the addresses and aliases for local hosts that # share this file. replace 'my.domain' below with the domainname of your # machine. # # in the presence of the domain name service or nis, this file may # not be consulted at all; see /etc/nsswitch.conf for the resolution order. # # ::1 localhost 127.0.0.1 localhost 201.20.156.178 central.technobox.com.br # # imaginary network. #10.0.0.2 myname.my.domain myname #10.0.0.3 myfriend.my.domain myfriend # # according to rfc 1918, you can use the following ip networks for # private nets which will never be connected to the internet: # # 10.0.0.0 - 10.255.255.255 # 172.16.0.0 - 172.31.255.255 # 192.168.0.0 - 192.168.255.255 # # in case you want to be able to connect to the internet, you need # real official assigned numbers. do not try to invent your own network # numbers but instead get one from your network provider (if any) or # from your regional registry (arin, apnic, lacnic, ripe ncc, or afrinic.) #