Multiple vulnerabilities in Repox

Posted date 12/12/2023
Importance
5 - Critical
Affected Resources

Repox, versions 2.3.7 and earlier.

Description

INCIBE has coordinated the publication of 6 vulnerabilities affecting Repox 2.3.7, a framework for managing data spaces, which have been discovered by David Cámara Galindo and Andrés Elizalde Galdeano, from Telefónica Tech.

These vulnerabilities have been assigned the following base scores CVSS v3.1, CVSS vectors and CWE vulnerability types:

  • CVE-2023-6718: CVSS v3.1: 9.4 | CVSS: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L | CWE-288.
  • CVE-2023-6719: CVSS v3.1: 6.3 | CVSS: AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L | CWE-79.
  • CVE-2023-6720: CVSS v3.1: 5.5 | CVSS: AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L | CWE-79.
  • CVE-2023-6721: CVSS v3.1: 8.3 | CVSS: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L | CWE-611.
  • CVE-2023-6722: CVSS v3.1: 7.5 | CVSS: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N | CWE-23.
  • CVE-2023-6723: CVSS v3.1: 10.0 | CVSS: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | CWE-434.
Solution

There is no reported solution at this time.

Detail
  • CVE-2023-6718: an authentication bypass vulnerability has been found in Repox, which allows a remote user to send a specially crafted POST request, due to the lack of any authentication method, resulting in the alteration or creation of users.
  • CVE-2023-6719: an XSS vulnerability has been detected in Repox, which allows an attacker to compromise interactions between a user and the vulnerable application, and can be exploited by a third party by sending a specially crafted JavaScript payload to a user, and thus gain full control of their session.
  • CVE-2023-6720: an XSS vulnerability stored in Repox has been identified, which allows a local attacker to store a specially crafted JavaScript payload on the server, due to the lack of proper sanitisation of field elements, allowing the attacker to trigger the malicious payload when the application loads.
  • CVE-2023-6721: an XEE vulnerability has been found in Repox, which allows a remote attacker to interfere with the application's XML data processing in the fileupload function, resulting in interaction between the attacker and the server's file system.
  • CVE-2023-6722: a path traversal vulnerability has been detected in Repox, which allows an attacker to read arbitrary files on the running server, resulting in a disclosure of sensitive information. An attacker could access files such as application code or data, backend credentials, operating system files...
  • CVE-2023-6723: an unrestricted file upload vulnerability has been identified in Repbox, which allows an attacker to upload malicious files via the transforamationfileupload function, due to the lack of proper file type validation controls, resulting in a full system compromise.
References list
Etiquetas