First published: Thu Dec 24 2020(Updated: )
An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dart Http | <=0.12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35669 has been classified as a high-severity vulnerability due to its potential for CRLF injection.
To fix CVE-2020-35669, update the Dart http package to the latest version beyond 0.12.2.
CRLF injection allows an attacker to manipulate HTTP headers through injected carriage return (CR) and line feed (LF) characters.
CVE-2020-35669 affects the Dart http package versions up to and including 0.12.2.
If your application is using the Dart http package version 0.12.2 or earlier and directly using the Request class, it may be vulnerable to CVE-2020-35669.