Joomla com_fabrik Directory Traversal Vulnerability (CVE-2020-37219)
Joomla com_fabrik 3.9.11 is vulnerable to a directory traversal attack (CVE-2020-37219) where an unauthenticated attacker can list arbitrary files by manipulating the folder parameter in a GET request to the onAjax_files method, using path traversal sequences to access system directories outside the web root.
Joomla com_fabrik version 3.9.11 is susceptible to a directory traversal vulnerability (CVE-2020-37219) that allows unauthenticated attackers to enumerate files on the system. This vulnerability exists within the onAjax_files method, where the folder parameter is not properly validated. By crafting a GET request with path traversal sequences in the folder parameter, an attacker can bypass intended restrictions and list files and directories outside the web root. This can lead to information disclosure and potentially further exploitation of the system.
Attack Chain
- An unauthenticated attacker identifies a Joomla com_fabrik installation running version 3.9.11.
- The attacker crafts a GET request targeting the
/index.phpendpoint with theoption=com_fabrikandtask=plugin.pluginAjaxparameters. - The request includes
plugin=fileuploadandmethod=onAjax_filesto target the vulnerable method. - The attacker injects path traversal sequences (e.g.,
../../../../) within thefolderparameter of the GET request. - The server-side application (com_fabrik) processes the request without proper sanitization of the
folderparameter. - The application interprets the path traversal sequences, allowing access to directories outside the intended web root.
- The attacker receives a response containing a list of files and directories within the traversed path.
- The attacker can repeat this process to map out the file system and identify sensitive files.
Impact
Successful exploitation of this vulnerability allows unauthenticated attackers to list arbitrary files on the affected system. This information disclosure can lead to the exposure of sensitive configuration files, database credentials, or other confidential data. The CVSS v3.1 score of 7.5 indicates a high severity due to the potential for unauthorized access to sensitive information.
Recommendation
- Upgrade com_fabrik to a version that addresses CVE-2020-37219.
- Implement input validation and sanitization on the
folderparameter within theonAjax_filesmethod to prevent path traversal attacks. - Deploy the Sigma rule
Detect Joomla com_fabrik Directory Traversal Attemptto identify potential exploitation attempts in web server logs. - Monitor web server access logs for suspicious GET requests to
index.phpwith thecom_fabrik,plugin=fileupload, andmethod=onAjax_filesparameters, particularly those containing path traversal sequences in thefolderparameter. - Implement web application firewall (WAF) rules to block requests containing path traversal sequences targeting the
onAjax_filesmethod.
Detection coverage 2
Detect Joomla com_fabrik Directory Traversal Attempt
highDetects CVE-2020-37219 exploitation attempt — directory traversal in Joomla com_fabrik component via crafted GET request.
Detect Joomla com_fabrik File Listing via Directory Traversal
mediumDetects CVE-2020-37219 post-exploitation — abnormal HTTP response status codes following directory traversal attempts in Joomla com_fabrik component.
Detection queries are available on the platform. Get full rules →