CVE-2020-35669

An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request.
References
Link Resource
https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133 Broken Link Release Notes Third Party Advisory
https://github.com/dart-lang/http/issues/511 Exploit Patch Third Party Advisory
https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133 Broken Link Release Notes Third Party Advisory
https://github.com/dart-lang/http/issues/511 Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:dart:http:*:*:*:*:*:dart:*:*

History

21 Nov 2024, 05:27

Type Values Removed Values Added
References () https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133 - Broken Link, Release Notes, Third Party Advisory () https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133 - Broken Link, Release Notes, Third Party Advisory
References () https://github.com/dart-lang/http/issues/511 - Exploit, Patch, Third Party Advisory () https://github.com/dart-lang/http/issues/511 - Exploit, Patch, Third Party Advisory

Information

Published : 2020-12-24 03:15

Updated : 2024-11-21 05:27


NVD link : CVE-2020-35669

Mitre link : CVE-2020-35669

CVE.ORG link : CVE-2020-35669


JSON object : View

Products Affected

dart

  • http
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')