{"uuid": "d7c33062-9f2d-45ab-bcee-dc7a9d8b654e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-37774", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13783", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-37774\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: There is a broken access control vulnerability in the Maarch RM 2.8.3 solution. When accessing some specific document (pdf, email) from an archive, a preview is proposed by the application. This preview generates a URL including an md5 hash of the file accessed. The document's URL (https://{url}/tmp/{MD5 hash of the document}) is then accessible without authentication.\n\ud83d\udccf Published: 2022-11-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-29T04:39:18.621Z\n\ud83d\udd17 References:\n1. http://maarch.com\n2. https://github.com/frame84/vulns/blob/main/MaarchRM/CVE-2022-37774/README.md", "creation_timestamp": "2025-04-29T05:11:21.000000Z"}