{"api_version":"1","generated_at":"2026-05-06T18:34:55+00:00","cve":"CVE-2020-35669","urls":{"html":"https://cve.report/CVE-2020-35669","api":"https://cve.report/api/cve/CVE-2020-35669.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-35669","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-35669"},"summary":{"title":"CVE-2020-35669","description":"An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2020-12-24 03:15:00","updated_at":"2022-07-19 11:02:00"},"problem_types":["CWE-74"],"metrics":[],"references":[{"url":"https://github.com/dart-lang/http/issues/511","name":"https://github.com/dart-lang/http/issues/511","refsource":"MISC","tags":["Exploit","Patch","Third Party Advisory"],"title":"Header injection and path forgery [security issue] · Issue #511 · dart-lang/http · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133","name":"https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133","refsource":"MISC","tags":[],"title":"http/CHANGELOG.md at master · dart-lang/http · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-35669","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35669","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"35669","vulnerable":"1","versionEndIncluding":"0.12.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dart","cpe5":"http","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"dart","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2020-35669","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/dart-lang/http/issues/511","refsource":"MISC","name":"https://github.com/dart-lang/http/issues/511"},{"refsource":"MISC","name":"https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133","url":"https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133"}]}},"nvd":{"publishedDate":"2020-12-24 03:15:00","lastModifiedDate":"2022-07-19 11:02:00","problem_types":["CWE-74"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dart:http:*:*:*:*:*:dart:*:*","versionEndIncluding":"0.12.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"35669","Ordinal":"195602","Title":"CVE-2020-35669","CVE":"CVE-2020-35669","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"35669","Ordinal":"1","NoteData":"An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"35669","Ordinal":"2","NoteData":"2020-12-23","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"35669","Ordinal":"3","NoteData":"2021-06-28","Type":"Other","Title":"Modified"}]}}}