Lucene search

K
githubGitHub Advisory DatabaseGHSA-68J8-FP38-P48Q
HistorySep 19, 2024 - 2:49 p.m.

Gematik Referenzvalidator has an XXE vulnerability that can lead to a Server Side Request Forgery attack

2024-09-1914:49:40
CWE-611
GitHub Advisory Database
github.com
3
gematik
referenzvalidator
xxe
vulnerability
patched
version 2.5.1
server side request forgery
woodstox wstxinputfactory
patches

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

45.1%

Impact

The profile location routine in the referencevalidator commons package is vulnerable to XML External Entities attack due to insecure defaults of the used Woodstox WstxInputFactory. A malicious XML resource can lead to network requests issued by referencevalidator and thus to a Server Side Request Forgery attack.

The vulnerability impacts applications which use referencevalidator to process XML resources from untrusted sources.

Patches

The problem has been patched with the 2.5.1 version of the referencevalidator. Users are strongly recommended to update to this version or a more recent one.

Workarounds

A pre-processing or manual analysis of input XML resources on existence of DTD definitions or external entities can mitigate the problem.

References

Affected configurations

Vulners
Node
de.gematik.refv.commonscommonsRange<2.5.1
VendorProductVersionCPE
de.gematik.refv.commonscommons*cpe:2.3:a:de.gematik.refv.commons:commons:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0.001

Percentile

45.1%

Related for GHSA-68J8-FP38-P48Q