Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-52007

Опубликовано: 08 нояб. 2024
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This is related to GHSA-6cr6-ph3p-f5rf, in which its fix (#1571 & #1717) was incomplete. This issue has been addressed in release version 6.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

A flaw was found in HAPI FHIR - HL7 FHIR Core Artifacts. eXtensible Stylesheet Language Transformations (XSLT) transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag could produce XML containing data from the host system.

Отчет

This vulnerability is of important severity rather than moderate due to its potential to expose sensitive host data and compromise system integrity. By exploiting the XXE vulnerability, an attacker can read arbitrary files (e.g., /etc/passwd), perform Denial of Service (DoS) through resource exhaustion, or even execute further attacks by leveraging accessible information.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apache Camel for Spring Boot 3ca.uhn.hapi.fhir/org.hl7.fhir.dstu2016mayOut of support scope
Red Hat build of Apache Camel for Spring Boot 3ca.uhn.hapi.fhir/org.hl7.fhir.dstu3Out of support scope
Red Hat build of Apache Camel for Spring Boot 3ca.uhn.hapi.fhir/org.hl7.fhir.r4Out of support scope
Red Hat build of Apache Camel for Spring Boot 3ca.uhn.hapi.fhir/org.hl7.fhir.r5Out of support scope
Red Hat build of Apache Camel for Spring Boot 3ca.uhn.hapi.fhir/org.hl7.fhir.utilitiesOut of support scope
Red Hat Fuse 7ca.uhn.hapi.fhir-org.hl7.fhir.coreWill not fix
Red Hat Fuse 7ca.uhn.hapi.fhir/org.hl7.fhir.dstu2016mayWill not fix
Red Hat Fuse 7ca.uhn.hapi.fhir/org.hl7.fhir.dstu3Will not fix
Red Hat Fuse 7ca.uhn.hapi.fhir/org.hl7.fhir.r4Will not fix
Red Hat Fuse 7ca.uhn.hapi.fhir/org.hl7.fhir.r5Will not fix

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-611
https://bugzilla.redhat.com/show_bug.cgi?id=2324794org.hl7.fhir.dstu2016may: org.hl7.fhir.dstu3: org.hl7.fhir.r4: org.hl7.fhir.r5: org.hl7.fhir.utilities: org.hl7.fhir.core: XXE vulnerability in XSLT parsing in `org.hl7.fhir.core`

EPSS

Процентиль: 47%
0.00239
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
nvd
около 1 года назад

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This is related to GHSA-6cr6-ph3p-f5rf, in which its fix (#1571 & #1717) was incomplete. This issue has been addressed in release version 6.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.6
github
около 1 года назад

XXE vulnerability in XSLT parsing in `org.hl7.fhir.core`

EPSS

Процентиль: 47%
0.00239
Низкий

8.6 High

CVSS3

Уязвимость CVE-2024-52007