<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2020-37224 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2020-37224/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:19:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2020-37224/feed.xml" rel="self" type="application/rss+xml"/><item><title>Joomla J2 JOBS 1.3.0 Authenticated SQL Injection Vulnerability (CVE-2020-37224)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37224-joomla-sql-injection/</link><pubDate>Wed, 13 May 2026 16:19:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37224-joomla-sql-injection/</guid><description>Joomla J2 JOBS 1.3.0 contains an authenticated SQL injection vulnerability (CVE-2020-37224) that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'sortby' parameter, potentially leading to sensitive information disclosure.</description><content:encoded><![CDATA[<p>CVE-2020-37224 is an authenticated SQL injection vulnerability affecting Joomla J2 JOBS version 1.3.0. The vulnerability allows authenticated attackers to inject arbitrary SQL code into database queries via the &lsquo;sortby&rsquo; parameter. An attacker can send crafted POST requests to the administrator index with malicious &lsquo;sortby&rsquo; values. Successful exploitation allows attackers to extract sensitive database information, modify data, or potentially gain further access to the system depending on the database privileges. This vulnerability was reported on May 13, 2026, and poses a significant risk to organizations using the affected J2 JOBS component, as it could lead to data breaches and compromise of sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for the Joomla J2 JOBS 1.3.0 component.</li>
<li>The attacker crafts a malicious POST request to the administrator index.</li>
<li>The POST request includes the &lsquo;sortby&rsquo; parameter with SQL injection payloads.</li>
<li>The application fails to properly sanitize the &lsquo;sortby&rsquo; parameter.</li>
<li>The unsanitized &lsquo;sortby&rsquo; value is incorporated into an SQL query.</li>
<li>The injected SQL code is executed by the database server.</li>
<li>The attacker extracts sensitive information from the database.</li>
<li>The attacker may use the extracted information for further attacks or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2020-37224) allows an authenticated attacker to inject arbitrary SQL queries, potentially leading to sensitive information disclosure. Depending on the database privileges, attackers might be able to modify data, escalate privileges, or even execute arbitrary code on the server. The impact could range from data breaches and service disruption to complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for Joomla J2 JOBS to address CVE-2020-37224.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts targeting the &lsquo;sortby&rsquo; parameter.</li>
<li>Review web server access logs for suspicious POST requests to the administrator index containing SQL syntax within the &lsquo;sortby&rsquo; parameter.</li>
<li>Implement input validation and sanitization for all user-supplied input, particularly the &lsquo;sortby&rsquo; parameter, to prevent SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>joomla</category><category>cve-2020-37224</category><category>web-application</category></item></channel></rss>