CVE-2020-8923
26.03.2020, 12:15
An improper HTML sanitization in Dart versions up to and including 2.7.1 and dev versions 2.8.0-dev.16.0, allows an attacker leveraging DOM Clobbering techniques to skip the sanitization and inject custom html/javascript (XSS). Mitigation: update your Dart SDK to 2.7.2, and 2.8.0-dev.17.0 for the dev version. If you cannot update, we recommend you review the way you use the affected APIs, and pay special attention to cases where user-provided data is used to populate DOM nodes. Consider using Element.innerText or Node.text to populate DOM elements.
Vendor | Product | Version |
---|---|---|
dart | dart_software_development_kit | 𝑥 < 2.7.2 |
dart | dart_software_development_kit | 2.8.0:dev0.0 |
dart | dart_software_development_kit | 2.8.0:dev1.0 |
dart | dart_software_development_kit | 2.8.0:dev10.0 |
dart | dart_software_development_kit | 2.8.0:dev11.0 |
dart | dart_software_development_kit | 2.8.0:dev12.0 |
dart | dart_software_development_kit | 2.8.0:dev13.0 |
dart | dart_software_development_kit | 2.8.0:dev14.0 |
dart | dart_software_development_kit | 2.8.0:dev15.0 |
dart | dart_software_development_kit | 2.8.0:dev16.0 |
dart | dart_software_development_kit | 2.8.0:dev2.0 |
dart | dart_software_development_kit | 2.8.0:dev3.0 |
dart | dart_software_development_kit | 2.8.0:dev4.0 |
dart | dart_software_development_kit | 2.8.0:dev5.0 |
dart | dart_software_development_kit | 2.8.0:dev6.0 |
dart | dart_software_development_kit | 2.8.0:dev7.0 |
dart | dart_software_development_kit | 2.8.0:dev8.0 |
dart | dart_software_development_kit | 2.8.0:dev9.0 |
𝑥
= Vulnerable software versions