CVE-2024-52007: XXE vulnerability in XSLT parsing in `org.hl7.fhir.core`
(updated )
XSLT parsing performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( ]> could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML.
References
- cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html
- cwe.mitre.org/data/definitions/611.html
- github.com/advisories/GHSA-gr3c-q7xf-47vh
- github.com/hapifhir/org.hl7.fhir.core
- github.com/hapifhir/org.hl7.fhir.core/issues/1571
- github.com/hapifhir/org.hl7.fhir.core/pull/1717
- github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-6cr6-ph3p-f5rf
- github.com/hapifhir/org.hl7.fhir.core/security/advisories/GHSA-gr3c-q7xf-47vh
- nvd.nist.gov/vuln/detail/CVE-2024-52007
Detect and mitigate CVE-2024-52007 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →