To expand on Steffen's comment:
How far you can, or can't, go with path traversal does not directly define whether it is a vulnerability. It doesn't matter whether path traversal works at all or not. Nor does it matter what the web server software is, or what characters are allowed or filtered, or anything else like that.
All that matters for this type of vulnerability is one simple question: Can you get access to any files that you shouldn't have access to, or cause any unauthorized server behavior? That's it. Everything else is a distraction from the real question.
- Are you, the user, authorized to access "file2" via any means? If so, it doesn't matter what means you use; it's not a vuln.
- Are you able to access files that other users can access but that you shouldn't be able to? That's a vuln, even if it doesn't go outside the webroot.
- Are you able to access files that no user should have access to, such as TLS private keys? That's a vuln, regardless of whether it's within the webroot.
- Are you able to cause a denial-of-service because the server tries to read a file that's too long, or a stream that doesn't end (such as
/dev/zero
)? That's a vuln, regardless of how you triggered the DoS.
- Are you able to browse the entire file system, but its a "toy" environment running a server specifically intended to let you browse it? That's not a vuln, regardless of whether you use path traversal, because such browsing is authorized anyhow.
You didn't give us enough information here to say either way, but hopefully this answer helps you answer your own question.