exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

MEDHOST Document Management System Hardcoded Credentials

MEDHOST Document Management System Hardcoded Credentials
Posted Jul 27, 2017
Authored by Allen Franks

MEDHOST Document Management System contains hard-coded credentials used for customer database and Apache Solr access.

tags | exploit
advisories | CVE-2017-11693, CVE-2017-11694
SHA-256 | 85a0b069bd2522941bc398c17e5e9d33b41ced7ad37d1eba52db6905451be0d8

MEDHOST Document Management System Hardcoded Credentials

Change Mirror Download
MEDHOST Document Management System contains multiple hard-coded credentials

CVE-2017-11693 & CVE-2017-11694

Overview
------------
Medhost Document Management system for all versions contains hard-coded credentials
used for customer database and Apache Solr access. This is a new vulnerability
not related to CVE-2016-4328 or CVE-2017-11614.

Description
------------

MEDHOST Document Management System contains multiple hard-coded credentials that are
used for customer database and Apache Solr access. An attacker with knowledge of the
hard-coded credentials and the ability to communicate directly with the database and
Apache Solr may be able to obtain or modify sensitive patient and financial
information. PostgreSQL is used as the Document Management System database. The account name
is dms. The Apache Solr account name is also dms. These passwords are hard-coded throughout
the application, and are the same across all installations. Customers do not have the option
to change passwords. The dms account for PostgreSQL has access to the database schema for
Document Management System. The dms account for Apache Solr has access to all indexed
patient documents. PostgreSQL listens on the default TCP port 5432. Apache Solr listens
on the default TCP port 8080.

WEB-INF/classes/database.properties:

# DMS database settings
jdbc.driverClass=org.postgresql.Driver
jdbc.url=jdbc:postgresql://localhost:5432/dms
jdbc.username=dms
jdbc.password=[redacted]

# Liquibase flag
run.liquibase.on.startup = true

WEB-INF/classes/solr.properties:

solr.url=http://localhost:8080/solr/dms
solr.username=dms
solr.password=[redacted]

Impact
------------

An attacker with knowledge of the hard-coded credentials and the ability to communicate
directly with the application database server may be able to obtain or modify patient and
financial information.

Solution
------------

The vendor has not issued a patch and has been unresponsive to this information after 3
attempts to communicate.

Restrict network access

As a general security practice, only allow connections from trusted hosts and networks.
Restricting access would prevent an attacker from using the hard-coded database credentials
from a blocked network location.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close