CRLF Injection Affecting dio package, versions <5.0.0


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.41% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about CRLF Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PUB-DIO-5891148
  • published11 Sept 2023
  • disclosed11 Sept 2023
  • creditset0x

Introduced: 11 Sep 2023

CVE-2021-31402  (opens in a new tab)
CWE-93  (opens in a new tab)

How to fix?

Upgrade dio to version 5.0.0 or higher.

Overview

dio is a powerful HTTP networking package for Dart/Flutter, supports Global configuration, Interceptors, FormData, Request cancellation, File uploading/downloading, Timeout, Custom adapters, Transformers, etc.

Affected versions of this package are vulnerable to CRLF Injection due to insufficient checks in the dio/lib/src/dio_mixin.dart package, if the attacker controls the HTTP method string.

CVSS Scores

version 3.1