First published: Fri Sep 23 2022(Updated: )
fhir-works-on-aws-authz-smart is an implementation of the authorization interface from the FHIR Works interface. Versions 3.1.1 and 3.1.2 are subject to Exposure of Sensitive Information to an Unauthorized Actor. This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access. Users of fhir-works-on-aws-authz-smart 3.1.1 or 3.1.2 should upgrade to version 3.1.3 or higher immediately. Versions 3.1.0 and below are unaffected. There is no workaround for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Fhir-works-on-aws-authz-smart | >=3.1.0<3.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39230 is a vulnerability in the fhir-works-on-aws-authz-smart software that allows a client of the API to retrieve more information than authorized.
CVE-2022-39230 has a severity rating of 6.5 (medium).
CVE-2022-39230 affects versions 3.1.0 to 3.1.3 of fhir-works-on-aws-authz-smart, allowing unauthorized retrieval of sensitive information.
To fix CVE-2022-39230, update fhir-works-on-aws-authz-smart to version 3.1.3 or later.
More information about CVE-2022-39230 can be found at the following reference: https://github.com/awslabs/fhir-works-on-aws-authz-smart/security/advisories/GHSA-vv7x-7w4m-q72f