First published: Fri Feb 18 2022(Updated: )
Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dart Dart Software Development Kit | <2.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-0451 is categorized as medium.
To fix CVE-2022-0451, update to Dart SDK version 2.16.0 or later.
CVE-2022-0451 is a cross-origin information exposure vulnerability.
Dart SDK versions prior to 2.16.0 are affected by CVE-2022-0451.
CVE-2022-0451 can lead to unauthorized exposure of sensitive information through authorization headers.