CVE-2020-35669

Source
https://cve.org/CVERecord?id=CVE-2020-35669
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35669.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-35669
Aliases
Published
2020-12-24T03:15:12.530Z
Modified
2026-03-13T00:41:00.788498Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request.

References

Affected packages

Git / github.com/dart-lang/http

Affected ranges

Type
GIT
Repo
https://github.com/dart-lang/http
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.12.2"
        }
    ]
}

Affected versions

0.*
0.11.1+3
0.11.2
0.11.3
0.11.3+1
0.11.3+10
0.11.3+11
0.11.3+12
0.11.3+13
0.11.3+14
0.11.3+15
0.11.3+16
0.11.3+17
0.11.3+2
0.11.3+3
0.11.3+4
0.11.3+5
0.11.3+6
0.11.3+7
0.11.3+8
0.11.3+9
0.12.0
0.12.0+2
0.12.0+3
0.12.0+4
0.12.1
0.12.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35669.json"