Vulnerability Details : CVE-2022-37774
There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication.
Vulnerability category: BypassGain privilege
Products affected by CVE-2022-37774
- cpe:2.3:a:maarch:maarch_rm:*:*:*:*:*:*:*:*
- cpe:2.3:a:maarch:maarch_rm:2.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-37774
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 28 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-37774
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2022-37774
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-37774
-
https://github.com/frame84/vulns/blob/main/MaarchRM/CVE-2022-37774/README.md
vulns/README.md at main · frame84/vulns · GitHubRelease Notes;Third Party Advisory
-
http://maarch.com
Maarch – Sécurisez vos documents professionnelsVendor Advisory
Jump to