Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-26118

Опубликовано: 30 мар. 2023
Источник: debian
EPSS Низкий

Описание

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
angular.jsfixed1.8.3-2package
angular.jsfixed1.8.3-1+deb12u1bookwormpackage
angular.jsno-dsabusterpackage

Примечания

  • https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046

  • PoC: https://stackblitz.com/edit/angularjs-vulnerability-inpur-url-validation-redos

EPSS

Процентиль: 64%
0.00475
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
redhat
почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
nvd
почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
github
почти 3 года назад

angular vulnerable to regular expression denial of service via the <input type="url"> element

CVSS3: 5.3
fstec
почти 3 года назад

Уязвимость функции input[url] среды проектирования приложений и платформы разработки одностраничных приложений Аngular, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 64%
0.00475
Низкий