{"id":"UBUNTU-CVE-2022-45442","details":"Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.","modified":"2026-01-30T02:53:23.333181Z","published":"2022-11-28T21:15:00Z","related":["USN-7664-1"],"upstream":["CVE-2022-45442"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-45442"},{"type":"REPORT","url":"https://github.com/sinatra/sinatra/security/advisories/GHSA-2x8x-jmrp-phxw"},{"type":"REPORT","url":"https://github.com/advisories/GHSA-8x94-hmjh-97hq"},{"type":"REPORT","url":"https://github.com/sinatra/sinatra/commit/ea8fc9495a350f7551b39e3025bfcd06f49f363b"},{"type":"REPORT","url":"https://www.blackhat.com/docs/eu-14/materials/eu-14-Hafif-Reflected-File-Download-A-New-Web-Attack-Vector.pdf"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-45442"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7664-1"}],"affected":[{"package":{"name":"ruby-sinatra","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ruby-sinatra@1.4.7-3ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.7-3ubuntu0.1~esm2"}]}],"versions":["1.4.6-2","1.4.7-3"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1.4.7-3ubuntu0.1~esm2","binary_name":"ruby-sinatra"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-45442.json"}},{"package":{"name":"ruby-sinatra","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/ruby-sinatra@1.4.8-1ubuntu0.1~esm2?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.8-1ubuntu0.1~esm2"}]}],"versions":["1.4.7-5","1.4.8-1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1.4.8-1ubuntu0.1~esm2","binary_name":"ruby-sinatra"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-45442.json"}},{"package":{"name":"ruby-sinatra","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/ruby-sinatra@2.0.8.1-1ubuntu0.1~esm2?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.8.1-1ubuntu0.1~esm2"}]}],"versions":["2.0.5-4ubuntu1","2.0.8.1-1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"2.0.8.1-1ubuntu0.1~esm2","binary_name":"ruby-rack-protection"},{"binary_version":"2.0.8.1-1ubuntu0.1~esm2","binary_name":"ruby-sinatra"},{"binary_version":"2.0.8.1-1ubuntu0.1~esm2","binary_name":"ruby-sinatra-contrib"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-45442.json"}},{"package":{"name":"ruby-sinatra","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ruby-sinatra@2.0.8.1-2+deb11u1build0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.8.1-2+deb11u1build0.22.04.1"}]}],"versions":["2.0.8.1-2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.0.8.1-2+deb11u1build0.22.04.1","binary_name":"ruby-rack-protection"},{"binary_version":"2.0.8.1-2+deb11u1build0.22.04.1","binary_name":"ruby-sinatra"},{"binary_version":"2.0.8.1-2+deb11u1build0.22.04.1","binary_name":"ruby-sinatra-contrib"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-45442.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}