Bug 2324794 (CVE-2024-52007) - CVE-2024-52007 org.hl7.fhir.dstu2016may: org.hl7.fhir.dstu3: org.hl7.fhir.r4: org.hl7.fhir.r5: org.hl7.fhir.utilities: org.hl7.fhir.core: XXE vulnerability in XSLT parsing in `org.hl7.fhir.core`
Summary: CVE-2024-52007 org.hl7.fhir.dstu2016may: org.hl7.fhir.dstu3: org.hl7.fhir.r4:...
Keywords:
Status: NEW
Alias: CVE-2024-52007
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-08 23:01 UTC by OSIDB Bzimport
Modified: 2024-11-20 12:16 UTC (History)
12 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:9806 0 None None None 2024-11-15 17:21:43 UTC

Description OSIDB Bzimport 2024-11-08 23:01:22 UTC
HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This is related to GHSA-6cr6-ph3p-f5rf, in which its fix (#1571 & #1717) was incomplete. This issue has been addressed in release version 6.4.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Comment 7 errata-xmlrpc 2024-11-15 17:21:41 UTC
This issue has been addressed in the following products:

  Red Hat build of Apache Camel 4.4.4 for Spring Boot

Via RHSA-2024:9806 https://access.redhat.com/errata/RHSA-2024:9806


Note You need to log in before you can comment on or make changes to this bug.