An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request.
References
Link | Resource |
---|---|
https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133 | Broken Link Release Notes Third Party Advisory |
https://github.com/dart-lang/http/issues/511 | Exploit Patch Third Party Advisory |
https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133 | Broken Link Release Notes Third Party Advisory |
https://github.com/dart-lang/http/issues/511 | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133 - Broken Link, Release Notes, Third Party Advisory | |
References | () https://github.com/dart-lang/http/issues/511 - Exploit, Patch, Third Party Advisory |
Information
Published : 2020-12-24 03:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35669
Mitre link : CVE-2020-35669
CVE.ORG link : CVE-2020-35669
JSON object : View
Products Affected
dart
- http
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')