First published: Wed Jan 05 2022(Updated: )
Bidirectional Unicode text can be interpreted and compiled differently than how it appears in editors which can be exploited to get nefarious code passed a code review by appearing benign. An attacker could embed a source that is invisible to a code reviewer that modifies the behavior of a program in unexpected ways.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dart Dart Software Development Kit | <2.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22567 is a vulnerability where bidirectional Unicode text can be interpreted and compiled differently, potentially allowing nefarious code to pass as benign during code review.
Dart Dart Software Development Kit versions up to 2.15.0 are affected by CVE-2021-22567.
CVE-2021-22567 has a severity level of 3.5 (medium).
To mitigate CVE-2021-22567, it's recommended to update Dart Software Development Kit to a version higher than 2.15.0.