## Overview ![[Screenshot from 2022-12-02 11-06-41.png]] - Allows an attacker to read files on the server that is running the application - Code - Data - Credentials - Sensitive OS files - Might even be able to write to files on the server Example Exploit: - Shopping application that loads images via HTML: ``` ``` - Attacker could request the following: ``` https://insecure-website.com/loadImage?filename=../../../etc/passwd ```