Skip to content
Threat Feed
medium advisory

Joomla com_fabrik Directory Traversal Vulnerability (CVE-2020-37219)

Joomla com_fabrik 3.9.11 is vulnerable to a directory traversal attack (CVE-2020-37219) where an unauthenticated attacker can list arbitrary files by manipulating the folder parameter in a GET request to the onAjax_files method, using path traversal sequences to access system directories outside the web root.

Joomla com_fabrik version 3.9.11 is susceptible to a directory traversal vulnerability (CVE-2020-37219) that allows unauthenticated attackers to enumerate files on the system. This vulnerability exists within the onAjax_files method, where the folder parameter is not properly validated. By crafting a GET request with path traversal sequences in the folder parameter, an attacker can bypass intended restrictions and list files and directories outside the web root. This can lead to information disclosure and potentially further exploitation of the system.

Attack Chain

  1. An unauthenticated attacker identifies a Joomla com_fabrik installation running version 3.9.11.
  2. The attacker crafts a GET request targeting the /index.php endpoint with the option=com_fabrik and task=plugin.pluginAjax parameters.
  3. The request includes plugin=fileupload and method=onAjax_files to target the vulnerable method.
  4. The attacker injects path traversal sequences (e.g., ../../../../) within the folder parameter of the GET request.
  5. The server-side application (com_fabrik) processes the request without proper sanitization of the folder parameter.
  6. The application interprets the path traversal sequences, allowing access to directories outside the intended web root.
  7. The attacker receives a response containing a list of files and directories within the traversed path.
  8. The attacker can repeat this process to map out the file system and identify sensitive files.

Impact

Successful exploitation of this vulnerability allows unauthenticated attackers to list arbitrary files on the affected system. This information disclosure can lead to the exposure of sensitive configuration files, database credentials, or other confidential data. The CVSS v3.1 score of 7.5 indicates a high severity due to the potential for unauthorized access to sensitive information.

Recommendation

  • Upgrade com_fabrik to a version that addresses CVE-2020-37219.
  • Implement input validation and sanitization on the folder parameter within the onAjax_files method to prevent path traversal attacks.
  • Deploy the Sigma rule Detect Joomla com_fabrik Directory Traversal Attempt to identify potential exploitation attempts in web server logs.
  • Monitor web server access logs for suspicious GET requests to index.php with the com_fabrik, plugin=fileupload, and method=onAjax_files parameters, particularly those containing path traversal sequences in the folder parameter.
  • Implement web application firewall (WAF) rules to block requests containing path traversal sequences targeting the onAjax_files method.

Detection coverage 2

Detect Joomla com_fabrik Directory Traversal Attempt

high

Detects CVE-2020-37219 exploitation attempt — directory traversal in Joomla com_fabrik component via crafted GET request.

sigma tactics: initial_access techniques: T1190 sources: webserver

Detect Joomla com_fabrik File Listing via Directory Traversal

medium

Detects CVE-2020-37219 post-exploitation — abnormal HTTP response status codes following directory traversal attempts in Joomla com_fabrik component.

sigma tactics: discovery techniques: T1083 sources: webserver

Detection queries are available on the platform. Get full rules →