CVE-2022-39230: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in awslabs fhir-works-on-aws-authz-smart
fhir-works-on-aws-authz-smart is an implementation of the authorization interface from the FHIR Works interface. Versions 3.1.1 and 3.1.2 are subject to Exposure of Sensitive Information to an Unauthorized Actor. This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access. Users of fhir-works-on-aws-authz-smart 3.1.1 or 3.1.2 should upgrade to version 3.1.3 or higher immediately. Versions 3.1.0 and below are unaffected. There is no workaround for this issue.
AI Analysis
Technical Summary
CVE-2022-39230 is a vulnerability identified in the awslabs project 'fhir-works-on-aws-authz-smart,' specifically affecting versions 3.1.1 and 3.1.2. This project implements an authorization interface for FHIR Works, which is a framework designed to facilitate the deployment of FHIR (Fast Healthcare Interoperability Resources) APIs on AWS. The vulnerability is classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. The core issue arises during 'search-type' API requests, where a client can retrieve more information than their OAuth scope permits. However, the vulnerability does not allow access to data about individuals outside the client's authorized scope, limiting the exposure to data within the authorized patient set but potentially more than intended. Versions 3.1.0 and below are unaffected, and the issue is resolved in version 3.1.3 and later. No workaround exists, making upgrading imperative. The vulnerability does not appear to have been exploited in the wild so far. The flaw impacts confidentiality by exposing more sensitive data than authorized, but it does not affect integrity or availability. Exploitation requires the client to be authenticated and authorized to access some patient data, but the flaw allows escalation within that scope. The vulnerability is medium severity, reflecting the partial exposure and the requirement for prior authorization.
Potential Impact
For European organizations, particularly those in healthcare or managing health data, this vulnerability poses a risk of unauthorized data exposure within the bounds of authorized patient records. Given the sensitive nature of healthcare data protected under GDPR and other privacy regulations, even limited overexposure can lead to compliance violations, reputational damage, and potential legal consequences. Organizations using fhir-works-on-aws-authz-smart versions 3.1.1 or 3.1.2 risk leaking more patient information than intended to authorized clients, which could be exploited by insiders or compromised clients to access excessive data. This could undermine patient trust and complicate regulatory audits. The impact is heightened in environments where fine-grained access control is critical and where multiple clients with varying scopes access the same FHIR API. Although the vulnerability does not allow access to unauthorized patient records, the overexposure within authorized records can still reveal sensitive health details beyond the minimum necessary, increasing privacy risks.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade fhir-works-on-aws-authz-smart to version 3.1.3 or later immediately. Since no workaround exists, organizations must prioritize patching to prevent data overexposure. Additionally, organizations should audit OAuth scopes and client permissions to ensure they follow the principle of least privilege, minimizing the potential data accessible even if overexposure occurs. Implementing enhanced monitoring and logging of API requests can help detect unusual access patterns or excessive data retrieval. Conducting regular security reviews of authorization logic and testing with scoped clients can identify potential overexposure issues proactively. For organizations unable to upgrade immediately, restricting access to the affected API endpoints through network controls or API gateways with additional authorization checks may reduce risk temporarily, though this is not a full solution. Finally, organizations should review their incident response plans to handle potential data exposure events in compliance with GDPR notification requirements.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Denmark, Finland
CVE-2022-39230: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in awslabs fhir-works-on-aws-authz-smart
Description
fhir-works-on-aws-authz-smart is an implementation of the authorization interface from the FHIR Works interface. Versions 3.1.1 and 3.1.2 are subject to Exposure of Sensitive Information to an Unauthorized Actor. This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access. Users of fhir-works-on-aws-authz-smart 3.1.1 or 3.1.2 should upgrade to version 3.1.3 or higher immediately. Versions 3.1.0 and below are unaffected. There is no workaround for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-39230 is a vulnerability identified in the awslabs project 'fhir-works-on-aws-authz-smart,' specifically affecting versions 3.1.1 and 3.1.2. This project implements an authorization interface for FHIR Works, which is a framework designed to facilitate the deployment of FHIR (Fast Healthcare Interoperability Resources) APIs on AWS. The vulnerability is classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. The core issue arises during 'search-type' API requests, where a client can retrieve more information than their OAuth scope permits. However, the vulnerability does not allow access to data about individuals outside the client's authorized scope, limiting the exposure to data within the authorized patient set but potentially more than intended. Versions 3.1.0 and below are unaffected, and the issue is resolved in version 3.1.3 and later. No workaround exists, making upgrading imperative. The vulnerability does not appear to have been exploited in the wild so far. The flaw impacts confidentiality by exposing more sensitive data than authorized, but it does not affect integrity or availability. Exploitation requires the client to be authenticated and authorized to access some patient data, but the flaw allows escalation within that scope. The vulnerability is medium severity, reflecting the partial exposure and the requirement for prior authorization.
Potential Impact
For European organizations, particularly those in healthcare or managing health data, this vulnerability poses a risk of unauthorized data exposure within the bounds of authorized patient records. Given the sensitive nature of healthcare data protected under GDPR and other privacy regulations, even limited overexposure can lead to compliance violations, reputational damage, and potential legal consequences. Organizations using fhir-works-on-aws-authz-smart versions 3.1.1 or 3.1.2 risk leaking more patient information than intended to authorized clients, which could be exploited by insiders or compromised clients to access excessive data. This could undermine patient trust and complicate regulatory audits. The impact is heightened in environments where fine-grained access control is critical and where multiple clients with varying scopes access the same FHIR API. Although the vulnerability does not allow access to unauthorized patient records, the overexposure within authorized records can still reveal sensitive health details beyond the minimum necessary, increasing privacy risks.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade fhir-works-on-aws-authz-smart to version 3.1.3 or later immediately. Since no workaround exists, organizations must prioritize patching to prevent data overexposure. Additionally, organizations should audit OAuth scopes and client permissions to ensure they follow the principle of least privilege, minimizing the potential data accessible even if overexposure occurs. Implementing enhanced monitoring and logging of API requests can help detect unusual access patterns or excessive data retrieval. Conducting regular security reviews of authorization logic and testing with scoped clients can identify potential overexposure issues proactively. For organizations unable to upgrade immediately, restricting access to the affected API endpoints through network controls or API gateways with additional authorization checks may reduce risk temporarily, though this is not a full solution. Finally, organizations should review their incident response plans to handle potential data exposure events in compliance with GDPR notification requirements.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf4463
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 5:06:24 PM
Last updated: 8/17/2025, 7:57:28 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.