Lucene search

K
cveVulDBCVE-2021-4295
HistoryDec 29, 2022 - 9:15 a.m.

CVE-2021-4295

2022-12-2909:15:08
CWE-611
VulDB
web.nvd.nist.gov
34
cve-2021-4295
vulnerability
onc
code-validator-api
xml handler
upgrade
patch
vdb-217018
nvd

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

60.7%

A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability.

Affected configurations

Nvd
Vulners
Node
healthitcode-validator-apiRange<1.0.31
VendorProductVersionCPE
healthitcode-validator-api*cpe:2.3:a:healthit:code-validator-api:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "ONC",
    "product": "code-validator-api",
    "versions": [
      {
        "version": "1.0.0",
        "status": "affected"
      },
      {
        "version": "1.0.1",
        "status": "affected"
      },
      {
        "version": "1.0.2",
        "status": "affected"
      },
      {
        "version": "1.0.3",
        "status": "affected"
      },
      {
        "version": "1.0.4",
        "status": "affected"
      },
      {
        "version": "1.0.5",
        "status": "affected"
      },
      {
        "version": "1.0.6",
        "status": "affected"
      },
      {
        "version": "1.0.7",
        "status": "affected"
      },
      {
        "version": "1.0.8",
        "status": "affected"
      },
      {
        "version": "1.0.9",
        "status": "affected"
      },
      {
        "version": "1.0.10",
        "status": "affected"
      },
      {
        "version": "1.0.11",
        "status": "affected"
      },
      {
        "version": "1.0.12",
        "status": "affected"
      },
      {
        "version": "1.0.13",
        "status": "affected"
      },
      {
        "version": "1.0.14",
        "status": "affected"
      },
      {
        "version": "1.0.15",
        "status": "affected"
      },
      {
        "version": "1.0.16",
        "status": "affected"
      },
      {
        "version": "1.0.17",
        "status": "affected"
      },
      {
        "version": "1.0.18",
        "status": "affected"
      },
      {
        "version": "1.0.19",
        "status": "affected"
      },
      {
        "version": "1.0.20",
        "status": "affected"
      },
      {
        "version": "1.0.21",
        "status": "affected"
      },
      {
        "version": "1.0.22",
        "status": "affected"
      },
      {
        "version": "1.0.23",
        "status": "affected"
      },
      {
        "version": "1.0.24",
        "status": "affected"
      },
      {
        "version": "1.0.25",
        "status": "affected"
      },
      {
        "version": "1.0.26",
        "status": "affected"
      },
      {
        "version": "1.0.27",
        "status": "affected"
      },
      {
        "version": "1.0.28",
        "status": "affected"
      },
      {
        "version": "1.0.29",
        "status": "affected"
      },
      {
        "version": "1.0.30",
        "status": "affected"
      }
    ],
    "modules": [
      "XML Handler"
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

60.7%

Related for CVE-2021-4295