First published: Thu Apr 22 2021(Updated: )
Bad validation logic in the Dart SDK versions prior to 2.12.3 allow an attacker to use an XSS attack via DOM clobbering. The validation logic in dart:html for creating DOM nodes from text did not sanitize properly when it came across template tags.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dart Dart Software Development Kit | <2.12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22540 has a medium severity rating due to its potential for XSS attacks.
To fix CVE-2021-22540, upgrade the Dart SDK to version 2.12.3 or later.
CVE-2021-22540 is caused by bad validation logic in the Dart SDK that fails to properly sanitize DOM nodes from text.
CVE-2021-22540 affects Dart SDK versions prior to 2.12.3.
CVE-2021-22540 can allow for XSS attacks, but it does not directly lead to remote code execution.