Vulnerability Description
The implementation of backslash parsing in the Dart URI class for versions prior to 2.18 and Flutter versions prior to 3.30 differs from the WhatWG URL standards. Dart uses the RFC 3986 syntax, which creates incompatibilities with the '\' characters in URIs, which can lead to auth bypass in webapps interpreting URIs. We recommend updating Dart or Flutter to mitigate the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dart | Dart Software Development Kit | < 2.18.0 |
| Flutter | Flutter | < 3.3.3 |
Related Weaknesses (CWE)
References
- https://github.com/dart-lang/sdk/blob/master/CHANGELOG.md#2182---2022-09-28Release NotesThird Party Advisory
- https://github.com/dart-lang/sdk/blob/master/CHANGELOG.md#2182---2022-09-28Release NotesThird Party Advisory
FAQ
What is CVE-2022-3095?
CVE-2022-3095 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The implementation of backslash parsing in the Dart URI class for versions prior to 2.18 and Flutter versions prior to 3.30 differs from the WhatWG URL standards. Dart uses the RFC 3986 syntax, which ...
How severe is CVE-2022-3095?
CVE-2022-3095 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-3095?
Check the references section above for vendor advisories and patch information. Affected products include: Dart Dart Software Development Kit, Flutter Flutter.