Vulnerabilities (CVE)

Filtered by vendor Sinatrarb Subscribe
Filtered by product Sinatra
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-45442 2 Debian, Sinatrarb 2 Debian Linux, Sinatra 2025-11-04 N/A 8.8 HIGH
Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.
CVE-2022-29970 2 Debian, Sinatrarb 2 Debian Linux, Sinatra 2025-11-04 5.0 MEDIUM 7.5 HIGH
Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.
CVE-2025-61921 1 Sinatrarb 1 Sinatra 2025-10-31 N/A 7.5 HIGH
Sinatra is a domain-specific language for creating web applications in Ruby. In versions prior to 4.2.0, there is a denial of service vulnerability in the `If-Match` and `If-None-Match` header parsing component of Sinatra, if the `etag` method is used when constructing the response. Carefully crafted input can cause `If-Match` and `If-None-Match` header parsing in Sinatra to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is typically involved in generating the `ETag` header value. Any applications that use the `etag` method when generating a response are impacted. Version 4.2.0 fixes the issue.
CVE-2018-7212 2 Microsoft, Sinatrarb 2 Windows, Sinatra 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters.
CVE-2018-11627 2 Redhat, Sinatrarb 2 Cloudforms, Sinatra 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.