Miggo Logo

GHSA-xr8x-pxm6-prjg: MITM based Zip Slip in `org.hl7.fhir.publisher:org.hl7.fhir.publisher`

9.1

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
1/23/2023
Updated
1/23/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.hl7.fhir.publisher:org.hl7.fhir.publishermaven< 1.2.301.2.30

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient path validation during zip extraction or retention of unsanitized paths. Publisher.java directly writes entries using entry.getName() without checks. ZipFetcher.java retains paths in FetchedFile objects, propagating the risk to downstream operations. IGPack2NpmConvertor.java's loadZip method stores raw paths, creating a latent vulnerability. WebSourceProvider.java was excluded because it includes a check (though untested), making it non-vulnerable in its current state.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t MITM **n *n**l* Zip-Slip. ### Vuln*r**ility #### Vuln*r**ility *: `Pu*lis**r.j*v*` T**r* is no v*li**tion t**t t** zip *il* **in* unp**k** **s *ntri*s t**t *r* not m*li*iously writin* outsi** o* t** int*n*** **stin*tion *ir**tory. *ttp

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt p*t* v*li**tion *urin* zip *xtr**tion or r*t*ntion o* uns*nitiz** p*t*s. Pu*lis**r.j*v* *ir**tly writ*s *ntri*s usin* `*ntry.**tN*m*()` wit*out ****ks. Zip**t***r.j*v* r*t*ins p*t*s in **t*****il* o*j**ts, pr