Skip to main content

CVE-2022-37109: n/a in n/a

Critical
VulnerabilityCVE-2022-37109cvecve-2022-37109
Published: Mon Nov 14 2022 (11/14/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie.

AI-Powered Analysis

AILast updated: 07/02/2025, 01:11:01 UTC

Technical Analysis

CVE-2022-37109 is a critical security vulnerability classified as Incorrect Access Control (CWE-522) affecting the 'patrickfuller camp' application up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767. The vulnerability arises because the password.txt file, which contains sensitive authentication data, is stored in the root directory served by the StaticFileHandler. Although Tornado's framework attempts to restrict access to this file by returning a 403 Forbidden error, this restriction can be bypassed by an attacker. Consequently, unauthorized users can access the password.txt file directly. More critically, the password hash contained within this file is also used as the cookie secret for session authentication. This design flaw allows an attacker who obtains the password hash to generate valid authentication cookies without needing to crack the password hash itself. This effectively grants full authentication bypass, enabling attackers to impersonate legitimate users and gain unauthorized access to the application. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical severity, with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No patches or vendor information are provided, indicating that users of this application must take immediate mitigating actions to protect their environments.

Potential Impact

For European organizations using the affected 'patrickfuller camp' application or derivatives, this vulnerability poses a severe risk. Unauthorized access to the password.txt file and the ability to forge authentication cookies can lead to full compromise of the application, exposing sensitive data and potentially enabling lateral movement within networks. Confidentiality is severely impacted as attackers can retrieve password hashes and session secrets. Integrity is compromised because attackers can impersonate users and modify data or configurations. Availability may also be affected if attackers disrupt services or lock out legitimate users. Given the critical nature of the vulnerability and the ease of exploitation (no authentication or user interaction required), organizations face a high risk of data breaches, regulatory non-compliance (e.g., GDPR), and reputational damage. This is particularly concerning for sectors with strict data protection requirements such as finance, healthcare, and government institutions across Europe.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. First, restrict access to the root directory served by StaticFileHandler by configuring the web server or application framework to explicitly deny access to sensitive files like password.txt. Employ network-level controls such as firewalls or reverse proxies to block unauthorized HTTP requests targeting sensitive endpoints. Replace the use of password hashes as cookie secrets with a separate, strong, randomly generated secret to prevent cookie forgery. Conduct thorough code reviews and security audits to identify and remediate similar access control weaknesses. Monitor logs for suspicious access attempts to password.txt or unusual authentication cookie usage. If feasible, isolate or decommission vulnerable instances until a secure patch or update is released. Additionally, implement multi-factor authentication to reduce the impact of compromised credentials. Finally, educate developers on secure coding practices to avoid embedding sensitive secrets in publicly accessible locations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-08-01T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec5ea

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 7/2/2025, 1:11:01 AM

Last updated: 8/7/2025, 12:49:48 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats