Source: ruby-sinatra Version: 2.2.2-1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for ruby-sinatra. CVE-2022-45442[0]: | Sinatra is a domain-specific language for creating web applications in | Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 | before 3.0.4. An application is vulnerable to a reflected file | download (RFD) attack that sets the Content-Disposition header of a | response when the filename is derived from user-supplied input. | Version 2.2.3 and 3.0.4 contain patches for this issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-45442 https://www.cve.org/CVERecord?id=CVE-2022-45442 [1] https://github.com/sinatra/sinatra/security/advisories/GHSA-2x8x-jmrp-phxw [2] https://github.com/sinatra/sinatra/commit/1808bcdf3424eab0c659ef2d0e85579aab977a1a Please adjust the affected versions in the BTS as needed. Regards, Salvatore