Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gr3c-q7xf-47vh

Опубликовано: 08 нояб. 2024
Источник: github
Github: Прошло ревью
CVSS4: 7.7
CVSS3: 8.6

Описание

XXE vulnerability in XSLT parsing in org.hl7.fhir.core

Summary

XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML.

Details

This is related to https://github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-6cr6-ph3p-f5rf, in which its fix ( https://github.com/hapifhir/org.hl7.fhir.core/issues/1571, https://github.com/hapifhir/org.hl7.fhir.core/pull/1717) was incomplete.

References

https://cwe.mitre.org/data/definitions/611.html https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#jaxp-documentbuilderfactory-saxparserfactory-and-dom4j

Пакеты

Наименование

ca.uhn.hapi.fhir:org.hl7.fhir.dstu3

maven
Затронутые версииВерсия исправления

< 6.4.0

6.4.0

Наименование

ca.uhn.hapi.fhir:org.hl7.fhir.r4

maven
Затронутые версииВерсия исправления

< 6.4.0

6.4.0

Наименование

ca.uhn.hapi.fhir:org.hl7.fhir.r4b

maven
Затронутые версииВерсия исправления

< 6.4.0

6.4.0

Наименование

ca.uhn.hapi.fhir:org.hl7.fhir.r5

maven
Затронутые версииВерсия исправления

< 6.4.0

6.4.0

Наименование

ca.uhn.hapi.fhir:org.hl7.fhir.utilities

maven
Затронутые версииВерсия исправления

< 6.4.0

6.4.0

Наименование

ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may

maven
Затронутые версииВерсия исправления

< 6.4.0

6.4.0

EPSS

Процентиль: 47%
0.00239
Низкий

7.7 High

CVSS4

8.6 High

CVSS3

Дефекты

CWE-611

Связанные уязвимости

CVSS3: 8.6
redhat
около 1 года назад

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This is related to GHSA-6cr6-ph3p-f5rf, in which its fix (#1571 & #1717) was incomplete. This issue has been addressed in release version 6.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.6
nvd
около 1 года назад

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This is related to GHSA-6cr6-ph3p-f5rf, in which its fix (#1571 & #1717) was incomplete. This issue has been addressed in release version 6.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 47%
0.00239
Низкий

7.7 High

CVSS4

8.6 High

CVSS3

Дефекты

CWE-611