First published: Mon Nov 28 2022(Updated: )
Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sinatrarb Sinatra | >=2.0.0<2.2.3 | |
Sinatrarb Sinatra | >=3.0.0<3.0.4 | |
Debian Debian Linux | =10.0 | |
>=2.0.0<2.2.3 | ||
>=3.0.0<3.0.4 | ||
=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Sinatra is a domain-specific language for creating web applications in Ruby.
The vulnerability ID for this issue is CVE-2022-45442.
The severity of CVE-2022-45442 is high with a CVSS score of 8.8.
The affected software is Sinatra versions 2.0 before 2.2.3 and 3.0 before 3.0.4, as well as Debian Linux version 10.0.
To fix the vulnerability in Sinatra, upgrade to version 2.2.3 or 3.0.4.