First published: Thu Dec 09 2021(Updated: )
When using the dart pub publish command to publish a package to a third-party package server, the request would be authenticated with an oauth2 access_token that is valid for publishing on pub.dev. Using these obtained credentials, an attacker can impersonate the user on pub.dev. We recommend upgrading past https://github.com/dart-lang/sdk/commit/d787e78d21e12ec1ef712d229940b1172aafcdf8 or beyond version 2.15.0
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dart Dart Software Development Kit | <2.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22568 is classified as a critical vulnerability due to its potential impact on user identity and authentication.
To fix CVE-2021-22568, update the Dart Software Development Kit to version 2.15.0 or later.
CVE-2021-22568 affects the Dart Software Development Kit versions prior to 2.15.0.
CVE-2021-22568 enables attackers to impersonate users on pub.dev using valid oauth2 access tokens.
Yes, your data could be at risk if an attacker exploits CVE-2021-22568 to impersonate your account on pub.dev.