<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Com_fabrik 3.9.11 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/com_fabrik-3.9.11/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:18:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/com_fabrik-3.9.11/feed.xml" rel="self" type="application/rss+xml"/><item><title>Joomla com_fabrik Directory Traversal Vulnerability (CVE-2020-37219)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37219-joomla-fabrik-traversal/</link><pubDate>Wed, 13 May 2026 16:18:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37219-joomla-fabrik-traversal/</guid><description>Joomla com_fabrik 3.9.11 is vulnerable to a directory traversal attack (CVE-2020-37219) where an unauthenticated attacker can list arbitrary files by manipulating the folder parameter in a GET request to the onAjax_files method, using path traversal sequences to access system directories outside the web root.</description><content:encoded><![CDATA[<p>Joomla com_fabrik version 3.9.11 is susceptible to a directory traversal vulnerability (CVE-2020-37219) that allows unauthenticated attackers to enumerate files on the system. This vulnerability exists within the onAjax_files method, where the folder parameter is not properly validated. By crafting a GET request with path traversal sequences in the folder parameter, an attacker can bypass intended restrictions and list files and directories outside the web root. This can lead to information disclosure and potentially further exploitation of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Joomla com_fabrik installation running version 3.9.11.</li>
<li>The attacker crafts a GET request targeting the <code>/index.php</code> endpoint with the <code>option=com_fabrik</code> and <code>task=plugin.pluginAjax</code> parameters.</li>
<li>The request includes <code>plugin=fileupload</code> and <code>method=onAjax_files</code> to target the vulnerable method.</li>
<li>The attacker injects path traversal sequences (e.g., <code>../../../../</code>) within the <code>folder</code> parameter of the GET request.</li>
<li>The server-side application (com_fabrik) processes the request without proper sanitization of the <code>folder</code> parameter.</li>
<li>The application interprets the path traversal sequences, allowing access to directories outside the intended web root.</li>
<li>The attacker receives a response containing a list of files and directories within the traversed path.</li>
<li>The attacker can repeat this process to map out the file system and identify sensitive files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to list arbitrary files on the affected system. This information disclosure can lead to the exposure of sensitive configuration files, database credentials, or other confidential data. The CVSS v3.1 score of 7.5 indicates a high severity due to the potential for unauthorized access to sensitive information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade com_fabrik to a version that addresses CVE-2020-37219.</li>
<li>Implement input validation and sanitization on the <code>folder</code> parameter within the <code>onAjax_files</code> method to prevent path traversal attacks.</li>
<li>Deploy the Sigma rule <code>Detect Joomla com_fabrik Directory Traversal Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server access logs for suspicious GET requests to <code>index.php</code> with the <code>com_fabrik</code>, <code>plugin=fileupload</code>, and <code>method=onAjax_files</code> parameters, particularly those containing path traversal sequences in the <code>folder</code> parameter.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences targeting the <code>onAjax_files</code> method.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>directory-traversal</category><category>web-application</category><category>joomla</category></item></channel></rss>