Path traversals may seem like an easy vulnerability class - read /etc/passwd, send a report, done. But it’s only scratching the surface. What about file writes? What files to read to prove the impact? How to turn it into RCE? To answer these questions, I went on the...