Path Traversal attacks are made possible when access to web content is not properly controlled and the web server is compromised. This is basically an HTTP exploit that gives the hackers unauthorized access to restricted directories. They eventually manipulate the web server and execute malicious commands outside its root directory/folder. These attacks are executed with the help of injections (the most common case being Resource Injections), typically executed with the help of crawlers.