Miggo Logo

CVE-2025-24363:
HL7 FHIR IG Publisher potentially exposes GitHub repo user and credential information

4.2

CVSS Score
3.1

Basic Information

EPSS Score
0.03852%
Published
1/24/2025
Updated
1/24/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.hl7.fhir.publisher:org.hl7.fhir.publisher.coremaven< 1.8.91.8.9
org.hl7.fhir.publisher:org.hl7.fhir.publisher.climaven< 1.8.91.8.9

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability arises because the generateDataFile method in Publisher.java retrieves the repository URL via git commands (e.g., gh() or getGitUrl()) and includes it in the output data. In the original code, this URL (potentially containing credentials) was added to the data object, which was then written to the Implementation Guide. The commit diff shows that the loop adding data properties to db.metadata was moved to occur before the repoSource is added to data, preventing the sensitive URL from being included in the metadata. The presence of the original code structure (where repoSource was included in data before metadata generation) directly caused the exposure.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t In *I *ont*xts, t** I* Pu*lis**r *LI us*s *it *omm*n*s to **t*rmin* t** URL o* t** ori*in*tin* r*po. I* t** r*po w*s *lon**, or ot**rwis* s*t to us* * r*po t**t us*s * us*rn*m* *n* *r***nti*l **s** URL, t** *ntir* URL will ** in*lu*** in t

Reasoning

T** vuln*r**ility *ris*s ****us* t** `**n*r*t***t**il*` m*t*o* in `Pu*lis**r.j*v*` r*tri*v*s t** r*pository URL vi* *it *omm*n*s (*.*., `**()` or `**t*itUrl()`) *n* in*lu**s it in t** output **t*. In t** ori*in*l *o**, t*is URL (pot*nti*lly *ont*inin