I am solving a lab related to serialization vulnerabilities. It deals with retrieving files based on the signature. The theory of the lab states as quoted, "Adding ./ will still give you the same file but the application will generate a different signature that may be loosely equal to 0."
ex:
curl -X POST -H "Content-Type: application/json" -d '{ "token": "<TOKEN>", "uuid": "../../.././././././././etc/passwd", "sig": 0}' https://lab.exploit/files
Would you please tell me how does this work at the back-end?