First published: Tue Nov 22 2022(Updated: )
There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Maarch Rm | >=2.8<2.8.6 | |
Maarch Rm | =2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37774 has a severity rating that indicates it allows unauthorized access to sensitive documents.
To fix CVE-2022-37774, upgrade to the latest version of Maarch RM beyond 2.9 to eliminate the broken access control vulnerability.
CVE-2022-37774 can lead to exposure of sensitive documents such as PDFs and emails due to inadequate access controls.
CVE-2022-37774 affects Maarch RM versions 2.8.0 through 2.8.6 and specifically version 2.9.
CVE-2022-37774 exploits broken access control by allowing users to access document previews via manipulated URLs containing MD5 hashes.