MEDHOST Document Management System contains hard-coded credentials that are used for customer database access. An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with the database may be able to obtain or modify sensitive patient and financial information. PostgreSQL is used as the Document Management System database. The account name is dms. The password is hard-coded throughout the application, and is the same across all installations. Customers do not have the option to change passwords. The dms account for PostgreSQL has access to the database schema for Document Management System.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Jul/71 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2017/Jul/71 | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Jul/71 - Mailing List, Third Party Advisory |
Information
Published : 2017-07-28 13:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-11693
Mitre link : CVE-2017-11693
CVE.ORG link : CVE-2017-11693
JSON object : View
Products Affected
medhost
- medhost_document_management_system
CWE
CWE-798
Use of Hard-coded Credentials