{"uuid": "1633e4cb-bae4-46f3-9e9c-ac6a6335c5c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45294", "type": "seen", "source": "https://t.me/cvedetector/4975", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45294 - \"HL7 FHIR Core XML External Entity Injection Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-45294 \nPublished : Sept. 6, 2024, 4:15 p.m. | 40\u00a0minutes ago \nDescription : The HL7 FHIR Core Artifacts repository provides the java core object handling code, with utilities (including validator), for the Fast Healthcare Interoperability Resources (FHIR) specification. Prior to version 6.3.23, XSLT transforms performed by various components are vulnerable to XML external entity injections. A processed XML file with a malicious DTD tag could produce XML containing data from the host system. This impacts use cases where org.hl7.fhir.core is being used to within a host where external clients can submit XML. This issue has been patched in release 6.3.23. No known workarounds are available. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-06T19:06:33.000000Z"}