CVE-2022-3095
Summary
| CVE | CVE-2022-3095 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-10-27 16:15:00 UTC |
| Updated | 2022-10-31 16:20:00 UTC |
| Description | The implementation of backslash parsing in the Dart URI class for versions prior to 2.18 and Flutter versions prior to 3.30 differs from the WhatWG URL standards. Dart uses the RFC 3986 syntax, which creates incompatibilities with the '\' characters in URIs, which can lead to auth bypass in webapps interpreting URIs. We recommend updating Dart or Flutter to mitigate the issue. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Dart | Dart Software Development Kit | All | All | All | All |
| Application | Flutter | Flutter | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| sdk/CHANGELOG.md at master · dart-lang/sdk · GitHub | CONFIRM | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Sohom Datta, Cryptonite, MIT Manipal
There are currently no legacy QID mappings associated with this CVE.