
Cloud Vulnerability DB
A community-led vulnerabilities database
A path traversal vulnerability (CVE-2023-6722) was discovered in Repox version 2.3.7 and earlier. The vulnerability was disclosed on December 13, 2023, and was discovered by researchers David Cámara Galindo and Andrés Elizalde Galdeano from Telefónica Tech. The vulnerability affects the Repox framework, which is used for managing data spaces (INCIBE Advisory).
The vulnerability is classified as a path traversal issue (CWE-23) that allows attackers to read arbitrary files on the running server. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (High) with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating that it can be exploited remotely without requiring privileges or user interaction (NVD).
The exploitation of this vulnerability can lead to the disclosure of sensitive information. An attacker could potentially access critical files such as application code, data, backend credentials, and operating system files (INCIBE Advisory).
As of the disclosure date, no official patches or solutions have been reported for this vulnerability (INCIBE Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."