{"id":"CVE-2022-45442","summary":"Sinatra vulnerable to Reflected File Download attack","details":"Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.","aliases":["GHSA-2x8x-jmrp-phxw"],"modified":"2026-04-16T04:33:19.663372819Z","published":"2022-11-28T00:00:00Z","related":["ALSA-2023:0855","ALSA-2023:0974","GHSA-2x8x-jmrp-phxw","GHSA-8x94-hmjh-97hq"],"database_specific":{"cwe_ids":["CWE-494"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/45xxx/CVE-2022-45442.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00020.html"},{"type":"WEB","url":"https://www.blackhat.com/docs/eu-14/materials/eu-14-Hafif-Reflected-File-Download-A-New-Web-Attack-Vector.pdf"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/45xxx/CVE-2022-45442.json"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-8x94-hmjh-97hq"},{"type":"ADVISORY","url":"https://github.com/sinatra/sinatra/security/advisories/GHSA-2x8x-jmrp-phxw"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45442"},{"type":"FIX","url":"https://github.com/sinatra/sinatra/commit/ea8fc9495a350f7551b39e3025bfcd06f49f363b"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00005.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sinatra/sinatra","events":[{"introduced":"815b69fe2510930de97a89f9318fcfa35165e96e"},{"fixed":"eca7b54a64d1b64c4245c0f025e8dabb1cafde7c"}],"database_specific":{"versions":[{"introduced":"3.0"},{"fixed":"3.0.4"}]}},{"type":"GIT","repo":"https://github.com/sinatra/sinatra","events":[{"introduced":"5de64980e0f0fe146d8b60ca3b009f183113e68b"},{"fixed":"0bdb254b9a21aaef9eb24540f174318abefca2a2"}],"database_specific":{"versions":[{"introduced":"2.0"},{"fixed":"2.2.3"}]}}],"versions":["v2.0.0","v2.0.1","v2.0.1.rc1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.8","v2.0.8.1","v2.1.0","v2.2.1","v2.2.2","v3.0.0","v3.0.1","v3.0.2","v3.0.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45442.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}