CVE-2020-37080

9.8 CRITICAL

📋 TL;DR

CVE-2020-37080 is a critical file deletion vulnerability in webTareas 2.0.p8 that allows authenticated attackers to delete arbitrary files on the server by manipulating the 'atttmp1' parameter in print_layout.php. This affects all installations of webTareas 2.0.p8, potentially allowing attackers to delete critical system files, configuration files, or application data.

💻 Affected Systems

Products:
  • webTareas
Versions: 2.0.p8
Operating Systems: All operating systems running webTareas
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of webTareas 2.0.p8 are vulnerable by default. The vulnerability exists in the administration component but may be accessible to authenticated users.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files (like /etc/passwd, /etc/shadow, or Windows system files), leading to system crashes, data loss, or enabling further attacks.

🟠

Likely Case

Application disruption through deletion of configuration files, user data, or web content, causing service outages and data loss.

🟢

If Mitigated

Limited impact if proper file permissions and access controls prevent deletion of critical files, though application-specific files remain vulnerable.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via web interface, making internet-facing installations immediately vulnerable to attack.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated users or attackers who gain initial access through other means.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID 48430). Attack requires authentication but is trivial to execute once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or apply workarounds. The project appears to be abandoned on SourceForge.

🔧 Temporary Workarounds

Remove vulnerable component

all

Delete or rename the vulnerable print_layout.php file to prevent exploitation

mv /path/to/webtareas/print_layout.php /path/to/webtareas/print_layout.php.bak

Restrict file permissions

linux

Set strict file permissions on critical system directories to prevent deletion

chmod 755 /etc
chmod 600 /etc/shadow
chmod 644 /etc/passwd

🧯 If You Can't Patch

  • Implement strict access controls and limit administrative access to trusted users only
  • Deploy web application firewall (WAF) rules to block requests containing file deletion patterns

🔍 How to Verify

Check if Vulnerable:

Check if webTareas 2.0.p8 is installed and if print_layout.php exists in the installation directory

Check Version:

Check webTareas configuration files or admin interface for version information

Verify Fix Applied:

Verify print_layout.php has been removed/renamed or that file permissions prevent arbitrary file deletion

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to print_layout.php with 'atttmp1' parameter containing file paths
  • File deletion events in system logs following web requests

Network Indicators:

  • POST/GET requests to print_layout.php with suspicious file paths in parameters

SIEM Query:

web.url: "*print_layout.php*" AND (web.param: "*atttmp1=*" OR web.param: "*../*" OR web.param: "*/etc/*")

🔗 References

📤 Share & Export