icon

We found results for “

CVE-2024-52007

Good to know:

icon
icon
icon

Date: November 8, 2024

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This is related to GHSA-6cr6-ph3p-f5rf, in which its fix (#1571 & #1717) was incomplete. This issue has been addressed in release version 6.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Language: Java

Severity Score

Severity Score

Weakness Type (CWE)

Improper Restriction of XML External Entity Reference ('XXE')

CWE-611

Top Fix

icon

Upgrade Version

Upgrade to version ca.uhn.hapi.fhir:org.hl7.fhir.dstu2016may:6.4.0, ca.uhn.hapi.fhir:org.hl7.fhir.dstu3:6.4.0, ca.uhn.hapi.fhir:org.hl7.fhir.r4:6.4.0, ca.uhn.hapi.fhir:org.hl7.fhir.r4b:6.4.0, ca.uhn.hapi.fhir:org.hl7.fhir.r5:6.4.0, ca.uhn.hapi.fhir:org.hl7.fhir.utilities:6.4.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us