Описание
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This is related to GHSA-6cr6-ph3p-f5rf, in which its fix (#1571 & #1717) was incomplete. This issue has been addressed in release version 6.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
A flaw was found in HAPI FHIR - HL7 FHIR Core Artifacts. eXtensible Stylesheet Language Transformations (XSLT) transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag could produce XML containing data from the host system.
Отчет
This vulnerability is of important severity rather than moderate due to its potential to expose sensitive host data and compromise system integrity. By exploiting the XXE vulnerability, an attacker can read arbitrary files (e.g., /etc/passwd), perform Denial of Service (DoS) through resource exhaustion, or even execute further attacks by leveraging accessible information.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat build of Apache Camel for Spring Boot 3 | ca.uhn.hapi.fhir/org.hl7.fhir.dstu2016may | Out of support scope | ||
| Red Hat build of Apache Camel for Spring Boot 3 | ca.uhn.hapi.fhir/org.hl7.fhir.dstu3 | Out of support scope | ||
| Red Hat build of Apache Camel for Spring Boot 3 | ca.uhn.hapi.fhir/org.hl7.fhir.r4 | Out of support scope | ||
| Red Hat build of Apache Camel for Spring Boot 3 | ca.uhn.hapi.fhir/org.hl7.fhir.r5 | Out of support scope | ||
| Red Hat build of Apache Camel for Spring Boot 3 | ca.uhn.hapi.fhir/org.hl7.fhir.utilities | Out of support scope | ||
| Red Hat Fuse 7 | ca.uhn.hapi.fhir-org.hl7.fhir.core | Will not fix | ||
| Red Hat Fuse 7 | ca.uhn.hapi.fhir/org.hl7.fhir.dstu2016may | Will not fix | ||
| Red Hat Fuse 7 | ca.uhn.hapi.fhir/org.hl7.fhir.dstu3 | Will not fix | ||
| Red Hat Fuse 7 | ca.uhn.hapi.fhir/org.hl7.fhir.r4 | Will not fix | ||
| Red Hat Fuse 7 | ca.uhn.hapi.fhir/org.hl7.fhir.r5 | Will not fix |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
8.6 High
CVSS3
Связанные уязвимости
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This is related to GHSA-6cr6-ph3p-f5rf, in which its fix (#1571 & #1717) was incomplete. This issue has been addressed in release version 6.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
XXE vulnerability in XSLT parsing in `org.hl7.fhir.core`
EPSS
8.6 High
CVSS3