570
VMScore

CVE-2017-11694

Published: 28/07/2017 Updated: 15/08/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

MEDHOST Document Management System contains hard-coded credentials that are used for Apache Solr access. An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with Apache Solr may be able to obtain or modify sensitive patient and financial information. The Apache Solr account name is dms. The password is hard-coded throughout the application, and is the same across all installations. Customers do not have the option to change passwords. The dms account for Apache Solr has access to all indexed patient documents.

Vulnerable Product Search on Vulmon Subscribe to Product

medhost medhost document management system -

Exploits

MEDHOST Document Management System contains hard-coded credentials used for customer database and Apache Solr access ...
MEDHOST Connex contains a hard-coded Mirth Connect administrative credential that is used for customer Mirth Connect management access ...