vulnerability
Arch Linux: Download of Code Without Integrity Check (CVE-2022-36359)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Aug 3, 2022 | Jul 11, 2025 | Nov 27, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Aug 3, 2022
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
Solution
arch-linux-upgrade-latest
References
- CVE-2022-36359
- https://attackerkb.com/topics/CVE-2022-36359
- URL-http://www.openwall.com/lists/oss-security/2022/08/03/1
- URL-https://docs.djangoproject.com/en/4.0/releases/security/
- URL-https://groups.google.com/g/django-announce/c/8cz--gvaJr4
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
- URL-https://security.netapp.com/advisory/ntap-20220915-0008/
- URL-https://www.debian.org/security/2022/dsa-5254
- URL-https://www.djangoproject.com/weblog/2022/aug/03/security-releases/
- CWE-494
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.