GHSA-pcjh-6r5h-r92r

Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-pcjh-6r5h-r92r/GHSA-pcjh-6r5h-r92r.json
Published
2022-08-11T18:12:35Z
Modified
2022-09-22T04:02:21.018967Z
Details

Similar to CVE-2022-36359 for Django, django-sendfile2 did not protect against a reflected file download attack in version 0.6.1 and earlier. If the file name used by django-sendfile2 was derived from user input, then it would be possible to perform a such an attack. A new version of django-sendfile2 will be released. Either download django-sendfile2 0.7.0 as a workaround or sanitize user input yourself, using Django's patch as a template: https://github.com/django/django/commit/bd062445cffd3f6cc6dcd20d13e2abed818fa173

References

Affected packages

PyPI / django-sendfile2

django-sendfile2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0
Fixed
0.7.0

Affected versions

0.*

0.4.0
0.4.1
0.4.2
0.4.3
0.5.1
0.6.0
0.6.1