The HL7 FHIR IG publisher is a tool to take a set of inputs and create a standard FHIR IG. Prior to version 1.7.4, XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag `( ]>` could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.publisher is being used to within a host where external clients can submit XML. A previous release provided an incomplete solution revealed by new testing. This issue has been patched as of version 1.7.4. No known workarounds are available.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The HL7 FHIR IG publisher is a tool to take a set of inputs and create a standard FHIR IG. Prior to version 1.7.4, XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag `( ]>` could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.publisher is being used to within a host where external clients can submit XML. A previous release provided an incomplete solution revealed by new testing. This issue has been patched as of version 1.7.4. No known workarounds are available. | |
Title | XXE vulnerability in XSLT parsing in `org.hl7.fhir.publisher` | |
Weaknesses | CWE-611 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-24T18:34:23.255Z
Updated: 2025-01-24T19:42:52.498Z
Reserved: 2024-11-15T17:11:13.442Z
Link: CVE-2024-52807

No data.

Status : Received
Published: 2025-01-24T19:15:12.640
Modified: 2025-01-24T19:15:12.640
Link: CVE-2024-52807

No data.