Описание
Angular Expressions before version 1.0.1 has a remote code execution vulnerability if you call expressions.compile(userControlledInput) where userControlledInput is text that comes from user input. If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution.
Ссылки
- Vendor Advisory
- Patch
- MitigationThird Party Advisory
- Vendor Advisory
- Patch
- MitigationThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.1 (исключая)
cpe:2.3:a:peerigon:angular-expressions:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 70%
0.00633
Низкий
8.7 High
CVSS3
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-74
CWE-74
Связанные уязвимости
EPSS
Процентиль: 70%
0.00633
Низкий
8.7 High
CVSS3
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-74
CWE-74