{"id":"PYSEC-2023-294","details":"An XSS vulnerability has been detected in Repox, which allows an attacker to compromise interactions between a user and the vulnerable application, and can be exploited by a third party by sending a specially crafted JavaScript payload to a user, and thus gain full control of their session.","modified":"2024-11-21T14:23:00.740180Z","published":"2023-12-13T10:15:00Z","withdrawn":"2024-11-22T04:37:05Z","references":[{"type":"WEB","url":"https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox"}],"affected":[{"package":{"name":"repox","ecosystem":"PyPI","purl":"pkg:pypi/repox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.0.1","0.0.2","0.0.3"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/repox/PYSEC-2023-294.yaml"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}