GHSA-pcjh-6r5h-r92r

Suggest an improvement
Source
https://github.com/advisories/GHSA-pcjh-6r5h-r92r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-pcjh-6r5h-r92r/GHSA-pcjh-6r5h-r92r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pcjh-6r5h-r92r
Published
2022-08-11T18:12:35Z
Modified
2024-12-03T06:06:56.847569Z
Summary
django-sendfile2 before 0.7.0 contains reflected file download vulnerability
Details

Similar to CVE-2022-36359 for Django, django-sendfile2 did not protect against a reflected file download attack in version 0.6.1 and earlier. If the file name used by django-sendfile2 was derived from user input, then it would be possible to perform a such an attack. A new version of django-sendfile2 will be released. Either download django-sendfile2 0.7.0 as a workaround or sanitize user input yourself, using Django's patch as a template: https://github.com/django/django/commit/bd062445cffd3f6cc6dcd20d13e2abed818fa173

Database specific
{
    "github_reviewed_at": "2022-08-11T18:12:35Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "nvd_published_at": null,
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

PyPI / django-sendfile2

Package

Name
django-sendfile2
View open source insights on deps.dev
Purl
pkg:pypi/django-sendfile2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.7.0

Affected versions

0.*

0.4.0
0.4.1
0.4.2
0.4.3
0.5.1
0.6.0
0.6.1