Description
The implementation of backslash parsing in the Dart URI class for versions prior to 2.18 and Flutter versions prior to 3.30 differs from the WhatWG URL standards. Dart uses the RFC 3986 syntax, which creates incompatibilities with the '\' characters in URIs, which can lead to auth bypass in webapps interpreting URIs. We recommend updating Dart or Flutter to mitigate the issue.
Published: 2022-10-27
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-42524 The implementation of backslash parsing in the Dart URI class for versions prior to 2.18 and Flutter versions prior to 3.30 differs from the WhatWG URL standards. Dart uses the RFC 3986 syntax, which creates incompatibilities with the '\' characters in URIs, which can lead to auth bypass in webapps interpreting URIs. We recommend updating Dart or Flutter to mitigate the issue.
History

Mon, 21 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Dart Dart Software Development Kit
Flutter Flutter
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-04-21T13:47:41.466Z

Reserved: 2022-09-02T00:00:00.000Z

Link: CVE-2022-3095

cve-icon Vulnrichment

Updated: 2024-08-03T01:00:10.279Z

cve-icon NVD

Status : Modified

Published: 2022-10-27T16:15:09.600

Modified: 2024-11-21T07:18:49.013

Link: CVE-2022-3095

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses