Описание
XXE vulnerability in XSLT transforms in org.hl7.fhir.core
Impact
XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML.
Patches
This issue has been patched in release 6.3.23
Workarounds
None.
References
Ссылки
- https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-59rq-22fm-x8q5
- https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-6cr6-ph3p-f5rf
- https://nvd.nist.gov/vuln/detail/CVE-2024-45294
- https://github.com/HL7/fhir-ig-publisher/releases/tag/1.6.22
- https://github.com/hapifhir/org.hl7.fhir.core/releases/tag/6.3.23
Пакеты
ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may
< 6.3.23
6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.dstu3
< 6.3.23
6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.r4
< 6.3.23
6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.r4b
< 6.3.23
6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.r5
< 6.3.23
6.3.23
ca.uhn.hapi.fhir:org.hl7.fhir.utilities
< 6.3.23
6.3.23
Связанные уязвимости
The HL7 FHIR Core Artifacts repository provides the java core object handling code, with utilities (including validator), for the Fast Healthcare Interoperability Resources (FHIR) specification. Prior to version 6.3.23, XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This issue has been patched in release 6.3.23. No known workarounds are available.
The HL7 FHIR Core Artifacts repository provides the java core object handling code, with utilities (including validator), for the Fast Healthcare Interoperability Resources (FHIR) specification. Prior to version 6.3.23, XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This issue has been patched in release 6.3.23. No known workarounds are available.