First published: Wed Aug 03 2022(Updated: )
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Djangoproject Django | >=3.2<3.2.15 | |
Djangoproject Django | >=4.0<4.0.7 | |
Debian Debian Linux | =11.0 | |
debian/python-django | 1:1.11.29-1~deb10u1 1:1.11.29-1+deb10u10 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:3.2.21-1 3:4.2.8-1 | |
pip/Django | <3.2.15 | 3.2.15 |
pip/Django | >=4.0<4.0.7 | 4.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36359 is a vulnerability in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7 that allows for a reflected file download attack.
CVE-2022-36359 affects Django versions 3.2 before 3.2.15 and 4.0 before 4.0.7.
The severity of CVE-2022-36359 is high, with a CVSS score of 8.8.
To fix CVE-2022-36359 in Django, you should upgrade to Django version 3.2.15 or 4.0.7.
You can find more information about CVE-2022-36359 at the following references: [Openwall](http://www.openwall.com/lists/oss-security/2022/08/03/1), [Django Releases](https://docs.djangoproject.com/en/4.0/releases/security/), and [Django Google Group](https://groups.google.com/g/django-announce/c/8cz--gvaJr4).