Skip to main content

CVE-2022-39230: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in awslabs fhir-works-on-aws-authz-smart

Medium
Published: Fri Sep 23 2022 (09/23/2022, 07:10:08 UTC)
Source: CVE
Vendor/Project: awslabs
Product: fhir-works-on-aws-authz-smart

Description

fhir-works-on-aws-authz-smart is an implementation of the authorization interface from the FHIR Works interface. Versions 3.1.1 and 3.1.2 are subject to Exposure of Sensitive Information to an Unauthorized Actor. This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access. Users of fhir-works-on-aws-authz-smart 3.1.1 or 3.1.2 should upgrade to version 3.1.3 or higher immediately. Versions 3.1.0 and below are unaffected. There is no workaround for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 17:06:24 UTC

Technical Analysis

CVE-2022-39230 is a vulnerability identified in the awslabs project 'fhir-works-on-aws-authz-smart,' specifically affecting versions 3.1.1 and 3.1.2. This project implements an authorization interface for FHIR Works, which is a framework designed to facilitate the deployment of FHIR (Fast Healthcare Interoperability Resources) APIs on AWS. The vulnerability is classified under CWE-200, indicating an exposure of sensitive information to unauthorized actors. The core issue arises during 'search-type' API requests, where a client can retrieve more information than their OAuth scope permits. However, the vulnerability does not allow access to data about individuals outside the client's authorized scope, limiting the exposure to data within the authorized patient set but potentially more than intended. Versions 3.1.0 and below are unaffected, and the issue is resolved in version 3.1.3 and later. No workaround exists, making upgrading imperative. The vulnerability does not appear to have been exploited in the wild so far. The flaw impacts confidentiality by exposing more sensitive data than authorized, but it does not affect integrity or availability. Exploitation requires the client to be authenticated and authorized to access some patient data, but the flaw allows escalation within that scope. The vulnerability is medium severity, reflecting the partial exposure and the requirement for prior authorization.

Potential Impact

For European organizations, particularly those in healthcare or managing health data, this vulnerability poses a risk of unauthorized data exposure within the bounds of authorized patient records. Given the sensitive nature of healthcare data protected under GDPR and other privacy regulations, even limited overexposure can lead to compliance violations, reputational damage, and potential legal consequences. Organizations using fhir-works-on-aws-authz-smart versions 3.1.1 or 3.1.2 risk leaking more patient information than intended to authorized clients, which could be exploited by insiders or compromised clients to access excessive data. This could undermine patient trust and complicate regulatory audits. The impact is heightened in environments where fine-grained access control is critical and where multiple clients with varying scopes access the same FHIR API. Although the vulnerability does not allow access to unauthorized patient records, the overexposure within authorized records can still reveal sensitive health details beyond the minimum necessary, increasing privacy risks.

Mitigation Recommendations

The primary and only effective mitigation is to upgrade fhir-works-on-aws-authz-smart to version 3.1.3 or later immediately. Since no workaround exists, organizations must prioritize patching to prevent data overexposure. Additionally, organizations should audit OAuth scopes and client permissions to ensure they follow the principle of least privilege, minimizing the potential data accessible even if overexposure occurs. Implementing enhanced monitoring and logging of API requests can help detect unusual access patterns or excessive data retrieval. Conducting regular security reviews of authorization logic and testing with scoped clients can identify potential overexposure issues proactively. For organizations unable to upgrade immediately, restricting access to the affected API endpoints through network controls or API gateways with additional authorization checks may reduce risk temporarily, though this is not a full solution. Finally, organizations should review their incident response plans to handle potential data exposure events in compliance with GDPR notification requirements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9845c4522896dcbf4463

Added to database: 5/21/2025, 9:09:25 AM

Last enriched: 6/22/2025, 5:06:24 PM

Last updated: 8/17/2025, 7:57:28 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats