{"id":"PYSEC-2023-297","details":"A path traversal vulnerability has been detected in Repox, which allows an attacker to read arbitrary files on the running server, resulting in a disclosure of sensitive information. An attacker could access files such as application code or data, backend credentials, operating system files...","modified":"2024-11-21T14:23:00.892241Z","published":"2023-12-13T10:15:00Z","withdrawn":"2024-11-22T04:37:05Z","references":[{"type":"WEB","url":"https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox"}],"affected":[{"package":{"name":"repox","ecosystem":"PyPI","purl":"pkg:pypi/repox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.0.1","0.0.2","0.0.3"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/repox/PYSEC-2023-297.yaml"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}