Impact
XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag ( <!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]>
could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML.
Patches
This issue has been patched in release 6.3.23
Workarounds
None.
References
MITRE CWE
OWASP XML External Entity Prevention Cheat Sheet
Impact
XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag (
<!DOCTYPE foo [<!ENTITY example SYSTEM "/etc/passwd"> ]>
could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML.Patches
This issue has been patched in release 6.3.23
Workarounds
None.
References
MITRE CWE
OWASP XML External Entity Prevention Cheat Sheet