René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

105 lines
3.7 KiB
JSON

{
"id": "CVE-2017-11694",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-28T13:29:00.227",
"lastModified": "2017-08-15T17:30:12.700",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "MEDHOST Document Management System contains hard-coded credentials that are used for Apache Solr access. An attacker with knowledge of the hard-coded credentials and the ability to communicate directly with Apache Solr may be able to obtain or modify sensitive patient and financial information. The Apache Solr account name is dms. The password is hard-coded throughout the application, and is the same across all installations. Customers do not have the option to change passwords. The dms account for Apache Solr has access to all indexed patient documents."
},
{
"lang": "es",
"value": "El sistema de gesti\u00f3n de documentos de MEDHOST contiene credenciales codificadas que son usadas para el acceso a Apache Solr. Un atacante con conocimiento de las credenciales codificadas y la capacidad de comunicarse directamente con Apache Solr puede obtener o modificar informaci\u00f3n financiera y confidencial del paciente. El nombre de la cuenta Apache Solr es dms. La contrase\u00f1a est\u00e1 codificada en toda la aplicaci\u00f3n y es la misma en todas las instalaciones. Los clientes no tienen la opci\u00f3n de cambiar las contrase\u00f1as. La cuenta dms para Apache Solr tiene acceso a todos los documentos de pacientes indexados."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 6.4
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:medhost:medhost_document_management_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE13E75-1EDB-4F32-952A-0ED20F12A3E9"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2017/Jul/71",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}