GHSA-6729-95V3-PJC2

Vulnerability from github – Published: 2025-01-24 20:40 – Updated: 2025-01-24 21:40
VLAI?
Summary
HL7 FHIR IG Publisher potentially exposes GitHub repo user and credential information
Details

Impact

In CI contexts, the IG Publisher CLI uses git commands to determine the URL of the originating repo. If the repo was cloned, or otherwise set to use a repo that uses a username and credential based URL, the entire URL will be included in the built Implementation Guide, exposing username and credential. This does not impact users that clone public repos without credentials, such as those using the auto-ig-build continuous integration infrastructure.

Patches

This problem has been patched in release 1.8.9

Workarounds

Users should update to 1.8.9 or the latest release

OR

Users should ensure the IG repo they are publishing does not have username or credentials included in the origin URL. Running the command git remote origin url should return a URL that contains no username, password, or token.

OR

Users should run the IG Publisher CLI with the -repo parameter and specify a URL that contains no username, password, or token.

Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "Maven",
        "name": "org.hl7.fhir.publisher:org.hl7.fhir.publisher.core"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1.8.9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "Maven",
        "name": "org.hl7.fhir.publisher:org.hl7.fhir.publisher.cli"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1.8.9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2025-24363"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-200"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2025-01-24T20:40:15Z",
    "nvd_published_at": "2025-01-24T19:15:13Z",
    "severity": "MODERATE"
  },
  "details": "### Impact\nIn CI contexts, the IG Publisher CLI uses git commands to determine the URL of the originating repo. If the repo was cloned, or otherwise set to use a repo that uses a username and credential based URL, the entire URL will be included in the built Implementation Guide, exposing username and credential. This does not impact users that clone public repos without credentials, such as those using the auto-ig-build continuous integration infrastructure.\n\n### Patches\nThis problem has been patched in release [1.8.9](https://github.com/HL7/fhir-ig-publisher/releases/tag/1.8.9)\n\n### Workarounds\nUsers should update to 1.8.9 or the latest release \n\nOR \n\nUsers should ensure the IG repo they are publishing does not have username or credentials included in the `origin` URL. Running the command `git remote origin url` should return a URL that contains no username, password, or token.\n\nOR\n\nUsers should run the IG Publisher CLI with the `-repo` parameter and specify a URL that contains no username, password, or token.",
  "id": "GHSA-6729-95v3-pjc2",
  "modified": "2025-01-24T21:40:43Z",
  "published": "2025-01-24T20:40:15Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-6729-95v3-pjc2"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24363"
    },
    {
      "type": "WEB",
      "url": "https://github.com/HL7/fhir-ig-publisher/commit/d968694b7dd041640efab5414d7077d5028569f7"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/HL7/fhir-ig-publisher"
    },
    {
      "type": "WEB",
      "url": "https://github.com/HL7/fhir-ig-publisher/releases/tag/1.8.9"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "HL7 FHIR IG Publisher potentially exposes GitHub repo user and credential information"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…