Bug 2153363 (CVE-2022-45442)

Summary: CVE-2022-45442 sinatra: Reflected File Download attack
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: amackenz, amasferr, chazlett, cluster-maint, idevat, mkudlej, mlisik, mpospisi, omular, tjochec, tojeline
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Sinatra, a domain-specific language for creating web applications in Ruby. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-02-28 11:44:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2153366, 2153367, 2153368, 2159420, 2159421, 2159422, 2159423, 2159424, 2159425, 2159426    
Bug Blocks: 2149170    

Description Sandipan Roy 2022-12-14 13:18:31 UTC
Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.

https://github.com/advisories/GHSA-8x94-hmjh-97hq
https://github.com/sinatra/sinatra/commit/ea8fc9495a350f7551b39e3025bfcd06f49f363b
https://github.com/sinatra/sinatra/security/advisories/GHSA-2x8x-jmrp-phxw
https://www.blackhat.com/docs/eu-14/materials/eu-14-Hafif-Reflected-File-Download-A-New-Web-Attack-Vector.pdf

Comment 2 Sandipan Roy 2022-12-14 13:22:11 UTC
Created golang-github-hub tracking bugs for this issue:

Affects: fedora-37 [bug 2153367]

Comment 6 errata-xmlrpc 2023-01-24 08:44:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:0393 https://access.redhat.com/errata/RHSA-2023:0393

Comment 7 errata-xmlrpc 2023-01-24 14:38:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:0427 https://access.redhat.com/errata/RHSA-2023:0427

Comment 8 errata-xmlrpc 2023-01-30 14:29:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2023:0506 https://access.redhat.com/errata/RHSA-2023:0506

Comment 9 errata-xmlrpc 2023-01-30 14:40:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:0527 https://access.redhat.com/errata/RHSA-2023:0527

Comment 10 errata-xmlrpc 2023-02-21 08:58:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0855 https://access.redhat.com/errata/RHSA-2023:0855

Comment 11 errata-xmlrpc 2023-02-21 10:03:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:0857 https://access.redhat.com/errata/RHSA-2023:0857

Comment 12 errata-xmlrpc 2023-02-28 08:04:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0974 https://access.redhat.com/errata/RHSA-2023:0974

Comment 13 Product Security DevOps Team 2023-02-28 11:44:30 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-45442