Skip to content

angular vulnerable to super-linear runtime due to backtracking

High severity GitHub Reviewed Published Feb 10, 2024 to the GitHub Advisory Database • Updated May 14, 2024

Package

npm angular (npm)

Affected versions

>= 1.3.0, <= 1.8.3

Patched versions

None
maven org.webjars.bower:angular (Maven)
>= 1.3.0, <= 1.8.3
None
maven org.webjars.npm:angular (Maven)
>= 1.3.0, <= 1.8.3
None

Description

This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.

Note:

This package is EOL and will not receive any updates to address this issue. Users should migrate to @angular/core.

References

Published by the National Vulnerability Database Feb 10, 2024
Published to the GitHub Advisory Database Feb 10, 2024
Reviewed Feb 13, 2024
Last updated May 14, 2024

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2024-21490

GHSA ID

GHSA-4w4v-5hc9-xrr2

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.