CVE-2020-35669
Summary
| CVE | CVE-2020-35669 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-12-24 03:15:00 UTC |
| Updated | 2022-07-19 11:02:00 UTC |
| Description | An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request. |
Risk And Classification
Problem Types: CWE-74
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Header injection and path forgery [security issue] · Issue #511 · dart-lang/http · GitHub | MISC | github.com | Exploit, Patch, Third Party Advisory |
| http/CHANGELOG.md at master · dart-lang/http · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.