CVE-2022-0451: CWE-305 Authentication Bypass by Primary Weakness in Google LLC Dart SDK
Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.
AI Analysis
Technical Summary
CVE-2022-0451 is a security vulnerability identified in the Dart SDK, specifically within the HTTPClient implementation of the dart:io library. The vulnerability arises from the way HTTPClient handles authorization headers during HTTP redirection processes. When an HTTP request includes an authorization header and the server responds with a redirect (3xx status code) to another domain, the HTTPClient by default follows the redirect and forwards the original authorization headers to the redirected URL. This behavior can lead to unintended exposure of sensitive authorization credentials to potentially malicious third-party domains if the redirect points to an attacker-controlled site. The root cause is an authentication bypass due to a primary weakness (CWE-305) where the client does not restrict the forwarding of sensitive headers during cross-origin redirects. This can result in unauthorized disclosure of credentials or tokens embedded in the authorization header. The vulnerability affects versions of the Dart SDK prior to 2.16.0, and the recommended mitigation is to update to version 2.16.0 or later, where this behavior has been corrected to prevent authorization headers from being sent to untrusted redirect destinations. No known exploits have been reported in the wild as of the published date, but the vulnerability poses a risk in scenarios where Dart-based applications make HTTP requests with sensitive authorization headers and follow redirects to external domains.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive authentication tokens or credentials in applications developed using the Dart SDK, particularly those that perform HTTP requests involving redirects. This exposure can compromise the confidentiality of user sessions, API keys, or other sensitive data, potentially enabling attackers to impersonate legitimate users or gain unauthorized access to backend services. The integrity of communications may also be affected if attackers use stolen credentials to manipulate data or perform unauthorized actions. Availability impact is less direct but could arise if attackers leverage stolen credentials to disrupt services or escalate privileges. Sectors in Europe relying on Dart for web or mobile applications, especially those handling sensitive personal data or critical infrastructure communications, could face regulatory and reputational consequences under GDPR and other data protection laws if such data leakage occurs. The medium severity rating reflects that exploitation requires a redirect scenario and that the vulnerability primarily affects confidentiality, but the risk is significant given the widespread use of Dart in modern application development.
Mitigation Recommendations
1. Upgrade the Dart SDK to version 2.16.0 or later immediately to ensure the HTTPClient no longer forwards authorization headers to redirected URLs. 2. Review application code to minimize the use of authorization headers in HTTP requests that may be redirected, or explicitly handle redirects to avoid automatic forwarding of sensitive headers. 3. Implement strict validation and whitelisting of redirect URLs within applications to prevent redirects to untrusted or attacker-controlled domains. 4. Employ network-level controls such as web application firewalls (WAFs) to monitor and block suspicious redirect patterns or unauthorized data exfiltration attempts. 5. Conduct security audits and penetration testing focusing on HTTP redirect handling and header management in Dart-based applications. 6. Educate developers on secure HTTP client usage patterns, emphasizing the risks of automatic header forwarding during redirects. 7. Monitor application logs for unusual redirect behaviors or unexpected authorization header transmissions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2022-0451: CWE-305 Authentication Bypass by Primary Weakness in Google LLC Dart SDK
Description
Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK to version 2.16.0 or beyond.
AI-Powered Analysis
Technical Analysis
CVE-2022-0451 is a security vulnerability identified in the Dart SDK, specifically within the HTTPClient implementation of the dart:io library. The vulnerability arises from the way HTTPClient handles authorization headers during HTTP redirection processes. When an HTTP request includes an authorization header and the server responds with a redirect (3xx status code) to another domain, the HTTPClient by default follows the redirect and forwards the original authorization headers to the redirected URL. This behavior can lead to unintended exposure of sensitive authorization credentials to potentially malicious third-party domains if the redirect points to an attacker-controlled site. The root cause is an authentication bypass due to a primary weakness (CWE-305) where the client does not restrict the forwarding of sensitive headers during cross-origin redirects. This can result in unauthorized disclosure of credentials or tokens embedded in the authorization header. The vulnerability affects versions of the Dart SDK prior to 2.16.0, and the recommended mitigation is to update to version 2.16.0 or later, where this behavior has been corrected to prevent authorization headers from being sent to untrusted redirect destinations. No known exploits have been reported in the wild as of the published date, but the vulnerability poses a risk in scenarios where Dart-based applications make HTTP requests with sensitive authorization headers and follow redirects to external domains.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive authentication tokens or credentials in applications developed using the Dart SDK, particularly those that perform HTTP requests involving redirects. This exposure can compromise the confidentiality of user sessions, API keys, or other sensitive data, potentially enabling attackers to impersonate legitimate users or gain unauthorized access to backend services. The integrity of communications may also be affected if attackers use stolen credentials to manipulate data or perform unauthorized actions. Availability impact is less direct but could arise if attackers leverage stolen credentials to disrupt services or escalate privileges. Sectors in Europe relying on Dart for web or mobile applications, especially those handling sensitive personal data or critical infrastructure communications, could face regulatory and reputational consequences under GDPR and other data protection laws if such data leakage occurs. The medium severity rating reflects that exploitation requires a redirect scenario and that the vulnerability primarily affects confidentiality, but the risk is significant given the widespread use of Dart in modern application development.
Mitigation Recommendations
1. Upgrade the Dart SDK to version 2.16.0 or later immediately to ensure the HTTPClient no longer forwards authorization headers to redirected URLs. 2. Review application code to minimize the use of authorization headers in HTTP requests that may be redirected, or explicitly handle redirects to avoid automatic forwarding of sensitive headers. 3. Implement strict validation and whitelisting of redirect URLs within applications to prevent redirects to untrusted or attacker-controlled domains. 4. Employ network-level controls such as web application firewalls (WAFs) to monitor and block suspicious redirect patterns or unauthorized data exfiltration attempts. 5. Conduct security audits and penetration testing focusing on HTTP redirect handling and header management in Dart-based applications. 6. Educate developers on secure HTTP client usage patterns, emphasizing the risks of automatic header forwarding during redirects. 7. Monitor application logs for unusual redirect behaviors or unexpected authorization header transmissions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Date Reserved
- 2022-02-01T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf7f53
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/20/2025, 1:33:26 PM
Last updated: 7/28/2025, 7:29:43 AM
Views: 11
Related Threats
CVE-2025-8932: SQL Injection in 1000 Projects Sales Management System
MediumCVE-2025-8931: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8930: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.