CAPEC-375
CWE-840
ISO27001-A.14.2.5
OWASP 2013-A1
OWASP 2017-A1
PCI v3.2-6.5.1
WASC-42

Reflected File Download

Severity:
Low
Summary

Invicti detected a possible reflected file download which might enable attackers to gain complete control over a website user's machine by virtually downloading a file from a trusted domain.

This is a vulnerability in the browsers that only affects Microsoft Windows systems.

Impact

An attacker can craft a URL on the target website that can execute commands on the website visitor's computer if the visitor accepts the download.

For a Reflected File Download attack to be successful:

  1. Attacker controlled input needs to be reflected in the response.
  2. Attacker should be able to change the URL of the vulnerable site to an executable file extension resulting a file download on the website user's browser.
Remediation
  • Add Content-Disposition header with filename attribute in the HTTP response:Content-Disposition: attachment; filename=f.txt
Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding