Skip to content

XXE vulnerability in XSLT parsing in `org.hl7.fhir.publisher`

High
dotasek published GHSA-8c3x-hq82-gjcm Jan 24, 2025

Package

maven org.hl7.fhir.publisher.cli (Maven)

Affected versions

< 1.7.4

Patched versions

1.7.4
maven org.hl7.fhir.publisher.core (Maven)
< 1.7.4
1.7.4

Description

Impact

XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.publisher is being used to within a host where external clients can submit XML.

A previous release provided an incomplete solution revealed by new testing.

Patches

This issue has been patched as of version 1.7.4

Workarounds

None

References

Previous Advisory for Incomplete solution
MITRE CWE
OWASP XML External Entity Prevention Cheat Sheet

Severity

High

CVE ID

CVE-2024-52807

Weaknesses

Improper Restriction of XML External Entity Reference

The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. Learn more on MITRE.

Credits