Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS02OGo4LWZwMzgtcDQ4cc4AA_sP

Gematik Referenzvalidator has an XXE vulnerability that can lead to a Server Side Request Forgery attack

Impact

The profile location routine in the referencevalidator commons package is vulnerable to XML External Entities attack due to insecure defaults of the used Woodstox WstxInputFactory. A malicious XML resource can lead to network requests issued by referencevalidator and thus to a Server Side Request Forgery attack.

The vulnerability impacts applications which use referencevalidator to process XML resources from untrusted sources.

Patches

The problem has been patched with the 2.5.1 version of the referencevalidator. Users are strongly recommended to update to this version or a more recent one.

Workarounds

A pre-processing or manual analysis of input XML resources on existence of DTD definitions or external entities can mitigate the problem.

References

Permalink: https://github.com/advisories/GHSA-68j8-fp38-p48q
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02OGo4LWZwMzgtcDQ4cc4AA_sP
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 month ago
Updated: about 1 month ago


CVSS Score: 8.6
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

Identifiers: GHSA-68j8-fp38-p48q, CVE-2024-46984
References: Repository: https://github.com/gematik/app-referencevalidator
Blast Radius: 1.0

Affected Packages

maven:de.gematik.refv.commons:commons
Affected Version Ranges: < 2.5.1
Fixed in: 2.5.1