JetBrains Ktor before 2.1.0 was vulnerable to the Reflect File Download attack
The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Ktor | Jetbrains | * | 2.1.0 (excluding) |