An issue was discovered in the http package before 0.13.3 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request via HTTP header injection. This issue has been addressed in commit abb2bb182 by validating request methods.
{ "nvd_published_at": "2020-12-24T03:15:00Z", "github_reviewed_at": "2022-08-04T21:05:04Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-74" ] }