Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-6cr6-ph3p-f5rf: XXE vulnerability in XSLT transforms in `org.hl7.fhir.core`

Impact

XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML.

Patches

This issue has been patched in release 6.3.23

Workarounds

None.

References

MITRE CWE OWASP XML External Entity Prevention Cheat Sheet

ghsa
#vulnerability#web#git#java#maven

Skip to content

Navigation Menu

Sign in

CVE-2024-45294

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • GitHub Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

Explore

*   All features
*   Documentation
*   GitHub Skills
*   Blog
  • By size

    • Enterprise
    • Teams
    • Startups

    By industry

    • Healthcare
    • Financial services
    • Manufacturing

    By use case

    • CI/CD & Automation
    • DevOps
    • DevSecOps
  • Topics

    • AI
    • DevOps
    • Security
    • Software Development
    • View all

    Explore

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

Repositories

*   Topics
*   Trending
*   Collections
    • Enterprise platform

      AI-powered developer platform

Available add-ons

*   Advanced Security
    
    Enterprise-grade security features
    
*   GitHub Copilot
    
    Enterprise-grade AI features
    
*   Premium Support
    
    Enterprise-grade 24/7 support
  • Pricing

Search code, repositories, users, issues, pull requests…

Provide feedback

We read every piece of feedback, and take your input very seriously.

Include my email address so I can be contacted

Saved searches****Use saved searches to filter your results more quickly

Sign in

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2024-45294

XXE vulnerability in XSLT transforms in `org.hl7.fhir.core`

High severity GitHub Reviewed Published Sep 6, 2024 in hapifhir/org.hl7.fhir.core • Updated Sep 6, 2024

Vulnerability details Dependabot alerts 0

Package

maven ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may (Maven)

Affected versions

< 6.3.23

Patched versions

6.3.23

maven ca.uhn.hapi.fhir:org.hl7.fhir.dstu3 (Maven)

< 6.3.23

6.3.23

maven ca.uhn.hapi.fhir:org.hl7.fhir.r4 (Maven)

< 6.3.23

6.3.23

maven ca.uhn.hapi.fhir:org.hl7.fhir.r4b (Maven)

< 6.3.23

6.3.23

maven ca.uhn.hapi.fhir:org.hl7.fhir.r5 (Maven)

< 6.3.23

6.3.23

maven ca.uhn.hapi.fhir:org.hl7.fhir.utilities (Maven)

< 6.3.23

6.3.23

Description

Impact

XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML.

Patches

This issue has been patched in release 6.3.23

Workarounds

None.

References

MITRE CWE
OWASP XML External Entity Prevention Cheat Sheet

References

  • GHSA-59rq-22fm-x8q5
  • GHSA-6cr6-ph3p-f5rf
  • https://nvd.nist.gov/vuln/detail/CVE-2024-45294
  • https://github.com/HL7/fhir-ig-publisher/releases/tag/1.6.22
  • https://github.com/hapifhir/org.hl7.fhir.core/releases/tag/6.3.23

dotasek published to hapifhir/org.hl7.fhir.core

Sep 6, 2024

Published by the National Vulnerability Database

Sep 6, 2024

Published to the GitHub Advisory Database

Sep 6, 2024

Reviewed

Sep 6, 2024

Last updated

Sep 6, 2024

Severity

High

8.6

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

None

User interaction

None

Scope

Changed

Confidentiality

High

Integrity

None

Availability

None

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Weaknesses

CWE-611

CVE ID

CVE-2024-45294

GHSA ID

GHSA-6cr6-ph3p-f5rf

Source code

hapifhir/org.hl7.fhir.core

Loading Checking history

See something to contribute? Suggest improvements for this vulnerability.

Related news

Red Hat Security Advisory 2024-7052-03

Red Hat Security Advisory 2024-7052-03 - An update for Red Hat Build of Apache Camel 4.4 for Quarkus 3.8 update is now available. The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2024-6883-03

Red Hat Security Advisory 2024-6883-03 - Red Hat build of Apache Camel 3.20.7 for Spring Boot release and security update is now available. Issues addressed include denial of service, information leakage, and server-side request forgery vulnerabilities.