logo

CVE-2025-24363 org.hl7.fhir.publisher:org.hl7.fhir.publisher.core

Package

Manager: maven
Name: org.hl7.fhir.publisher:org.hl7.fhir.publisher.core
Vulnerable Version: >=0 <1.8.9

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00024 pctl0.04691

Details

HL7 FHIR IG Publisher potentially exposes GitHub repo user and credential information ### Impact In CI contexts, the IG Publisher CLI uses git commands to determine the URL of the originating repo. If the repo was cloned, or otherwise set to use a repo that uses a username and credential based URL, the entire URL will be included in the built Implementation Guide, exposing username and credential. This does not impact users that clone public repos without credentials, such as those using the auto-ig-build continuous integration infrastructure. ### Patches This problem has been patched in release [1.8.9](https://github.com/HL7/fhir-ig-publisher/releases/tag/1.8.9) ### Workarounds Users should update to 1.8.9 or the latest release OR Users should ensure the IG repo they are publishing does not have username or credentials included in the `origin` URL. Running the command `git remote origin url` should return a URL that contains no username, password, or token. OR Users should run the IG Publisher CLI with the `-repo` parameter and specify a URL that contains no username, password, or token.

Metadata

Created: 2025-01-24T20:40:15Z
Modified: 2025-01-24T21:40:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-6729-95v3-pjc2/GHSA-6729-95v3-pjc2.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-6729-95v3-pjc2
Finding: F310
Auto approve: 1