An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc591c07d875e543a12492725b83e9410e709a198
Found host file trough Directory traversal: server|20.247.121.188 port|17091 type|1 #maint|server is under maintenance. we will be back online shortly. thank you for your patience! beta_server|127.0.0.1 beta_port|17091 beta_type|1 meta|defined rtendmarkerbs1001|unknown