An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5254-1 | python-django security update |
EUVD |
EUVD-2022-0092 | An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. |
Github GHSA |
GHSA-8x94-hmjh-97hq | Django vulnerable to Reflected File Download attack |
Ubuntu USN |
USN-5549-1 | Django vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T16:32:48.215Z
Reserved: 2022-07-21T00:00:00.000Z
Link: CVE-2022-36359
No data.
Status : Modified
Published: 2022-08-03T14:15:08.710
Modified: 2024-11-21T07:12:51.800
Link: CVE-2022-36359
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA
Ubuntu USN