Lucene search

K
cvelistGoogleCVELIST:CVE-2022-3095
HistoryOct 27, 2022 - 12:00 a.m.

CVE-2022-3095 Incorrect parsing of the backslash characters in Dart library

2022-10-2700:00:00
CWE-20
Google
www.cve.org
cve-2022-3095
dart
flutter
uri
parsing
backslash
whatwg url
rfc 3986
authentication bypass
webapps

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.1%

The implementation of backslash parsing in the Dart URI class for versions prior to 2.18 and Flutter versions prior to 3.30 differs from the WhatWG URL standards. Dart uses the RFC 3986 syntax, which creates incompatibilities with the '' characters in URIs, which can lead to auth bypass in webapps interpreting URIs. We recommend updating Dart or Flutter to mitigate the issue.

CNA Affected

[
  {
    "vendor": "Google LLC",
    "product": "Dart",
    "versions": [
      {
        "version": "stable",
        "status": "affected",
        "lessThan": "2.18.2",
        "versionType": "custom"
      },
      {
        "version": "Flutter",
        "status": "affected",
        "lessThan": "3.3.3",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "all"
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

57.1%

Related for CVELIST:CVE-2022-3095