// For flags

CVE-2022-39230

Security issue in fhir-works-on-aws-authz-smart

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

fhir-works-on-aws-authz-smart is an implementation of the authorization interface from the FHIR Works interface. Versions 3.1.1 and 3.1.2 are subject to Exposure of Sensitive Information to an Unauthorized Actor. This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access. Users of fhir-works-on-aws-authz-smart 3.1.1 or 3.1.2 should upgrade to version 3.1.3 or higher immediately. Versions 3.1.0 and below are unaffected. There is no workaround for this issue.

fhir-works-on-aws-authz-smart es una implementación de la interfaz de autorización de la interfaz FHIR Works. Las versiones 3.1.1 y 3.1.2, están sujetas a una Exposición de Información Confidencial a un Actor No Autorizado. Este problema permite que un cliente de la API recupere más información de la que permite el ámbito de OAuth del cliente cuando realiza peticiones de tipo "search-type". Este problema no permitiría a un cliente recuperar información sobre individuos distintos de aquellos a los que el cliente ya estaba autorizado a acceder. Los usuarios de fhir-works-on-aws-authz-smart versiones 3.1.1 o 3.1.2, deben actualizar a versión 3.1.3 o superior inmediatamente. Las versiones 3.1.0 y anteriores no están afectadas. No se presenta ninguna mitigación para este problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-09-23 CVE Published
  • 2024-04-15 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Amazon
Search vendor "Amazon"
Fhir-works-on-aws-authz-smart
Search vendor "Amazon" for product "Fhir-works-on-aws-authz-smart"
>= 3.1.0 < 3.1.3
Search vendor "Amazon" for product "Fhir-works-on-aws-authz-smart" and version " >= 3.1.0 < 3.1.3"
-
Affected