Описание
dio vulnerable to CRLF injection with HTTP method string
Impact
The dio package 4.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669.
Patches
The vulnerability has been resolved by https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984, and included since v5.0.0.
Workarounds
Cherry-pick the commit to your own fork can resolves the vulberability too.
References
Ссылки
- https://github.com/cfug/dio/security/advisories/GHSA-9324-jv53-9cc8
- https://nvd.nist.gov/vuln/detail/CVE-2021-31402
- https://github.com/cfug/dio/issues/1752
- https://github.com/flutterchina/dio/issues/1130
- https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984
- https://osv.dev/GHSA-jwpw-q68h-r678
- https://security.snyk.io/vuln/SNYK-PUB-DIO-5891148
Пакеты
Наименование
dio
Затронутые версииВерсия исправления
< 5.0.0
5.0.0
Связанные уязвимости
CVSS3: 7.5
nvd
почти 5 лет назад
The dio package 4.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669.