Bug 2310447 (CVE-2024-45294)

Summary: CVE-2024-45294 org.hl7.fhir.core: org.hl7.fhir.dstu3: org.hl7.fhir.r4: org.hl7.fhir.r4b: org.hl7.fhir.r5: org.hl7.fhir.utilities: XXE vulnerability in XSLT transforms in `org.hl7.fhir.core`
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: anstephe, avibelli, bgeorges, chazlett, clement.escoffier, cmiranda, dandread, dkreling, fmariani, fmongiar, gmalinko, gsmet, janstey, jmartisk, jnethert, jpoth, lthon, manderse, mosmerov, olubyans, pcongius, pdelbell, pgallagh, pjindal, probinso, rruss, rstepani, rsvoboda, sausingh, sbiarozk, sdouglas, tcunning, tqvarnst, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in HAPI FHIR - HL7 FHIR Core Artifacts. eXtensible Stylesheet Language Transformations (XSLT) transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag could produce XML containing data from the host system. This issue impacts use cases where org.hl7.fhir.core is being used within a host where external clients can submit XML.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2024-09-06 16:20:35 UTC
The HL7 FHIR Core Artifacts repository provides the java core object handling code, with utilities (including validator), for the Fast Healthcare Interoperability Resources (FHIR) specification. Prior to version 6.3.23, XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This issue has been patched in release 6.3.23. No known workarounds are available.

Comment 1 Robb Gatica 2024-09-06 19:07:07 UTC
Package 			 Affected versions Patched versions
org.hl7.fhir.dstu2016may (Maven) < 6.3.23          6.3.23
org.hl7.fhir.dstu3 (Maven)	 < 6.3.23	   6.3.23
org.hl7.fhir.r4 (Maven)		 < 6.3.23	   6.3.23
org.hl7.fhir.r4b (Maven)	 < 6.3.23	   6.3.23
org.hl7.fhir.r5 (Maven)		 < 6.3.23	   6.3.23
org.hl7.fhir.utilities (Maven)	 < 6.3.23	   6.3.23

Comment 2 errata-xmlrpc 2024-09-19 16:47:00 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 3.20.7 for Spring Boot

Via RHSA-2024:6883 https://access.redhat.com/errata/RHSA-2024:6883

Comment 3 errata-xmlrpc 2024-09-24 12:52:07 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel for Quarkus 2.13

Via RHSA-2024:7052 https://access.redhat.com/errata/RHSA-2024:7052

Comment 4 errata-xmlrpc 2024-10-14 15:53:43 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 4.4.3 for Spring Boot

Via RHSA-2024:8064 https://access.redhat.com/errata/RHSA-2024:8064