PYSEC-2023-297

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/repox/PYSEC-2023-297.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2023-297
Withdrawn
2024-11-22T04:37:05Z
Published
2023-12-13T10:15:00Z
Modified
2024-11-21T14:23:00.892241Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

A path traversal vulnerability has been detected in Repox, which allows an attacker to read arbitrary files on the running server, resulting in a disclosure of sensitive information. An attacker could access files such as application code or data, backend credentials, operating system files...

References

Affected packages

PyPI / repox

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.0.1
0.0.2
0.0.3

Database specific

source
"https://github.com/pypa/advisory-database/blob/main/vulns/repox/PYSEC-2023-297.yaml"