CVE-2025-24363:
HL7 FHIR IG Publisher potentially exposes GitHub repo user and credential information
4.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.03852%
CWE
Published
1/24/2025
Updated
1/24/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.hl7.fhir.publisher:org.hl7.fhir.publisher.core | maven | < 1.8.9 | 1.8.9 |
org.hl7.fhir.publisher:org.hl7.fhir.publisher.cli | maven | < 1.8.9 | 1.8.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises because the generateDataFile
method in Publisher.java
retrieves the repository URL via git commands (e.g., gh()
or getGitUrl()
) and includes it in the output data. In the original code, this URL (potentially containing credentials) was added to the data
object, which was then written to the Implementation Guide. The commit diff shows that the loop adding data
properties to db.metadata
was moved to occur before the repoSource
is added to data
, preventing the sensitive URL from being included in the metadata. The presence of the original code structure (where repoSource
was included in data
before metadata generation) directly caused the exposure.