Lucene search

K
cvelistGoogleCVELIST:CVE-2022-0451
HistoryFeb 18, 2022 - 1:35 p.m.

CVE-2022-0451 Auth bypass in Dark SDK

2022-02-1813:35:11
CWE-305
Google
www.cve.org
4
cve-2022-0451
dart sdk
httpclient
authorization headers
cross origin redirects
sensitive information
httpclient
version 2.16.0

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

23.3%

Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.

CNA Affected

[
  {
    "product": "Dart SDK",
    "vendor": "Google LLC",
    "versions": [
      {
        "lessThan": "2.16.0",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

23.3%

Related for CVELIST:CVE-2022-0451