
Cloud Vulnerability DB
A community-led vulnerabilities database
An XML External Entity (XXE) vulnerability (CVE-2023-6721) was discovered in Repox version 2.3.7 and earlier. The vulnerability was disclosed on December 12, 2023, by researchers David Cámara Galindo and Andrés Elizalde Galdeano from Telefónica Tech. This security flaw allows remote attackers to interfere with the application's XML data processing in the fileupload function (INCIBE Advisory).
The vulnerability is classified with a CVSS v3.1 base score of 8.3 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L. The vulnerability is identified as CWE-611 (Improper Restriction of XML External Entity Reference). The flaw specifically affects the fileupload function's XML data processing capabilities, enabling interaction between the attacker and the server's file system (NVD).
The vulnerability allows attackers to interact with the server's file system through manipulation of XML data processing. This can potentially lead to unauthorized access to sensitive files, data exposure, and system compromise through the fileupload function (INCIBE Advisory).
As of the vulnerability disclosure, no official solution or patch has been reported for this vulnerability (INCIBE Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."