Vulnerability Description
MEDHOST Document Management System contains hard-coded credentials that are used for customer database access. An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with the database may be able to obtain or modify sensitive patient and financial information. PostgreSQL is used as the Document Management System database. The account name is dms. The password is hard-coded throughout the application, and is the same across all installations. Customers do not have the option to change passwords. The dms account for PostgreSQL has access to the database schema for Document Management System.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Medhost | Medhost Document Management System | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2017/Jul/71Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2017/Jul/71Mailing ListThird Party Advisory
FAQ
What is CVE-2017-11693?
CVE-2017-11693 is a vulnerability with a CVSS score of 9.1 (CRITICAL). MEDHOST Document Management System contains hard-coded credentials that are used for customer database access. An attacker with knowledge of the hard-coded credentials and the ability to communicate d...
How severe is CVE-2017-11693?
CVE-2017-11693 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-11693?
Check the references section above for vendor advisories and patch information. Affected products include: Medhost Medhost Document Management System.