{"id":"CVE-2022-36359","details":"An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.","aliases":["BIT-django-2022-36359","GHSA-8x94-hmjh-97hq","PYSEC-2022-245"],"modified":"2026-05-15T11:54:13.187567176Z","published":"2022-08-03T00:00:00Z","related":["openSUSE-SU-2022:10103-1","openSUSE-SU-2023:0005-1","openSUSE-SU-2024:12236-1","openSUSE-SU-2024:14208-1","openSUSE-SU-2025:14662-1","openSUSE-SU-2026:10005-1"],"database_specific":{"cna_assigner":"mitre","unresolved_ranges":[{"source":"DESCRIPTION","extracted_events":[{"introduced":"3.2"},{"fixed":"3.2.15"},{"introduced":"4.0"},{"fixed":"4.0.7"}]}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36359.json"},"references":[{"type":"WEB","url":"https://docs.djangoproject.com/en/4.0/releases/security/"},{"type":"WEB","url":"https://groups.google.com/g/django-announce/c/8cz--gvaJr4"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36359.json"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36359"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20220915-0008/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5254"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2022/08/03/1"},{"type":"ARTICLE","url":"https://www.djangoproject.com/weblog/2022/aug/03/security-releases/"}],"schema_version":"1.7.5"}