Vulnerability Description
JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fhir | Hapi Fhir | < 5.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/hapifhir/hapi-fhir/issues/2641Third Party Advisory
- https://github.com/hapifhir/hapi-fhir/pull/2642PatchThird Party Advisory
- https://hapifhir.ioVendor Advisory
- https://github.com/hapifhir/hapi-fhir/issues/2641Third Party Advisory
- https://github.com/hapifhir/hapi-fhir/pull/2642PatchThird Party Advisory
- https://hapifhir.ioVendor Advisory
FAQ
What is CVE-2021-32053?
CVE-2021-32053 is a vulnerability with a CVSS score of 5.3 (MEDIUM). JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement t...
How severe is CVE-2021-32053?
CVE-2021-32053 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-32053?
Check the references section above for vendor advisories and patch information. Affected products include: Fhir Hapi Fhir.