CVE-2022-37774: n/a in n/a
There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication.
AI Analysis
Technical Summary
CVE-2022-37774 is a medium-severity broken access control vulnerability affecting Maarch RM version 2.8.3, an open-source document and records management solution. The vulnerability arises from the way the application generates preview URLs for certain archived documents such as PDFs and emails. When a user requests a preview, the application creates a URL containing an MD5 hash of the document file, for example, https://{url}/tmp/{MD5 hash of the document}. Critically, this URL is accessible without any authentication or authorization checks, meaning that anyone who knows or can guess the MD5 hash can access the document preview directly. Since MD5 hashes are deterministic and can be computed if the document content is known or partially known, this creates a risk of unauthorized disclosure of sensitive documents stored in the archive. The vulnerability does not require user interaction or privileges to exploit, and it affects confidentiality but not integrity or availability. The CVSS 3.1 base score is 5.3, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality only. No known exploits have been reported in the wild, and no patches or vendor advisories are currently available. The underlying weakness corresponds to CWE-287 (Improper Authentication), indicating that the application fails to properly enforce access controls on document preview URLs. This vulnerability could be leveraged by attackers to harvest sensitive information from document archives if they can enumerate or guess MD5 hashes, especially in environments where sensitive or confidential documents are stored and accessed via Maarch RM 2.8.3.
Potential Impact
For European organizations using Maarch RM 2.8.3, this vulnerability poses a significant risk to the confidentiality of archived documents. Sensitive information such as personal data, internal communications, or proprietary documents could be exposed without authentication, violating data protection regulations like GDPR. The impact is particularly critical for sectors handling highly confidential or regulated data, including government agencies, healthcare providers, legal firms, and financial institutions. Unauthorized access to document previews could lead to data breaches, reputational damage, regulatory fines, and loss of trust. Since the vulnerability does not affect integrity or availability, the primary concern is information leakage. The ease of exploitation—no authentication or user interaction required—means that attackers or unauthorized insiders could potentially access sensitive documents remotely if they can discover or guess the MD5 hashes. This risk is amplified in environments where document contents or naming conventions are predictable, facilitating hash computation or brute forcing. Although no active exploitation is currently known, the presence of this vulnerability in a document management system used in Europe necessitates prompt attention to prevent potential data leaks.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Restrict access to the /tmp/ directory or the URL pattern serving document previews via web server configuration or network controls, limiting access to authenticated users or trusted IP ranges. 2) Implement additional authentication and authorization checks at the application level for document preview URLs to ensure only authorized users can access previews. 3) Replace the use of MD5 hashes in URLs with cryptographically stronger, unpredictable tokens or session-based access controls to prevent URL guessing or enumeration. 4) Monitor web server logs for unusual access patterns to /tmp/ URLs that may indicate scanning or brute forcing attempts. 5) If possible, upgrade to a newer version of Maarch RM where this vulnerability is fixed or apply custom patches to enforce proper access control. 6) Conduct an audit of archived documents accessible via preview URLs to identify and mitigate exposure of sensitive data. 7) Educate users and administrators about the risk of sharing preview URLs publicly or with unauthorized parties. 8) Employ web application firewalls (WAFs) to detect and block suspicious requests targeting document preview endpoints. These measures go beyond generic advice by focusing on access control enforcement, URL tokenization, and monitoring specific to the vulnerability's exploitation vector.
Affected Countries
France, Germany, Italy, Spain, Belgium, Netherlands
CVE-2022-37774: n/a in n/a
Description
There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication.
AI-Powered Analysis
Technical Analysis
CVE-2022-37774 is a medium-severity broken access control vulnerability affecting Maarch RM version 2.8.3, an open-source document and records management solution. The vulnerability arises from the way the application generates preview URLs for certain archived documents such as PDFs and emails. When a user requests a preview, the application creates a URL containing an MD5 hash of the document file, for example, https://{url}/tmp/{MD5 hash of the document}. Critically, this URL is accessible without any authentication or authorization checks, meaning that anyone who knows or can guess the MD5 hash can access the document preview directly. Since MD5 hashes are deterministic and can be computed if the document content is known or partially known, this creates a risk of unauthorized disclosure of sensitive documents stored in the archive. The vulnerability does not require user interaction or privileges to exploit, and it affects confidentiality but not integrity or availability. The CVSS 3.1 base score is 5.3, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality only. No known exploits have been reported in the wild, and no patches or vendor advisories are currently available. The underlying weakness corresponds to CWE-287 (Improper Authentication), indicating that the application fails to properly enforce access controls on document preview URLs. This vulnerability could be leveraged by attackers to harvest sensitive information from document archives if they can enumerate or guess MD5 hashes, especially in environments where sensitive or confidential documents are stored and accessed via Maarch RM 2.8.3.
Potential Impact
For European organizations using Maarch RM 2.8.3, this vulnerability poses a significant risk to the confidentiality of archived documents. Sensitive information such as personal data, internal communications, or proprietary documents could be exposed without authentication, violating data protection regulations like GDPR. The impact is particularly critical for sectors handling highly confidential or regulated data, including government agencies, healthcare providers, legal firms, and financial institutions. Unauthorized access to document previews could lead to data breaches, reputational damage, regulatory fines, and loss of trust. Since the vulnerability does not affect integrity or availability, the primary concern is information leakage. The ease of exploitation—no authentication or user interaction required—means that attackers or unauthorized insiders could potentially access sensitive documents remotely if they can discover or guess the MD5 hashes. This risk is amplified in environments where document contents or naming conventions are predictable, facilitating hash computation or brute forcing. Although no active exploitation is currently known, the presence of this vulnerability in a document management system used in Europe necessitates prompt attention to prevent potential data leaks.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Restrict access to the /tmp/ directory or the URL pattern serving document previews via web server configuration or network controls, limiting access to authenticated users or trusted IP ranges. 2) Implement additional authentication and authorization checks at the application level for document preview URLs to ensure only authorized users can access previews. 3) Replace the use of MD5 hashes in URLs with cryptographically stronger, unpredictable tokens or session-based access controls to prevent URL guessing or enumeration. 4) Monitor web server logs for unusual access patterns to /tmp/ URLs that may indicate scanning or brute forcing attempts. 5) If possible, upgrade to a newer version of Maarch RM where this vulnerability is fixed or apply custom patches to enforce proper access control. 6) Conduct an audit of archived documents accessible via preview URLs to identify and mitigate exposure of sensitive data. 7) Educate users and administrators about the risk of sharing preview URLs publicly or with unauthorized parties. 8) Employ web application firewalls (WAFs) to detect and block suspicious requests targeting document preview endpoints. These measures go beyond generic advice by focusing on access control enforcement, URL tokenization, and monitoring specific to the vulnerability's exploitation vector.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-08-08T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef17a
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 10:50:29 PM
Last updated: 7/26/2025, 1:12:56 AM
Views: 8
Related Threats
CVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP
UnknownCarmaker’s Portal Vulnerability Could Have Allowed Hackers to Unlock Vehicles and Access Data
MediumCVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54525: CWE-1287: Improper Validation of Specified Type of Input in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54478: CWE-306: Missing Authentication for Critical Function in Mattermost Mattermost Confluence Plugin
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.