CVE-2022-45442

Source
https://cve.org/CVERecord?id=CVE-2022-45442
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45442.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-45442
Aliases
Downstream
Related
Published
2022-11-28T00:00:00Z
Modified
2026-02-13T02:36:26.931673Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Sinatra vulnerable to Reflected File Download attack
Details

Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.

Database specific
{
    "cwe_ids": [
        "CWE-494"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/45xxx/CVE-2022-45442.json"
}
References

Affected packages

Git / github.com/sinatra/sinatra

Affected versions

v2.*
v2.0.0
v2.0.1
v2.0.1.rc1
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.0.8.1
v2.1.0
v2.2.0
v2.2.1
v2.2.2
v3.*
v3.0.0
v3.0.1
v3.0.2
v3.0.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45442.json"

Git / github.com/wordpress/wordpress-develop

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45442.json"