{"id":"CVE-2022-36359","details":"An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.","aliases":["BIT-django-2022-36359","GHSA-8x94-hmjh-97hq","PYSEC-2022-245"],"modified":"2026-04-16T04:30:24.642119617Z","published":"2022-08-03T14:15:08.710Z","related":["openSUSE-SU-2022:10103-1","openSUSE-SU-2023:0005-1","openSUSE-SU-2024:12236-1","openSUSE-SU-2024:14208-1","openSUSE-SU-2025:14662-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220915-0008/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5254"},{"type":"ADVISORY","url":"https://groups.google.com/g/django-announce/c/8cz--gvaJr4"},{"type":"FIX","url":"https://www.djangoproject.com/weblog/2022/aug/03/security-releases/"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2022/08/03/1"},{"type":"FIX","url":"https://docs.djangoproject.com/en/4.0/releases/security/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"3591e1c1acbd7c13174275367c3fdf012cb0413b"},{"fixed":"653a7bd7b7c2f7c3ffe6b22be53da1472c491474"},{"introduced":"ef62a3a68c9d558486145a42c0d71ea9a76add9e"},{"fixed":"e9e9729846dc24dc73264341094ed51f2c8ac3dc"}],"database_specific":{"versions":[{"introduced":"3.2"},{"fixed":"3.2.15"},{"introduced":"4.0"},{"fixed":"4.0.7"}]}}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36359.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}