Описание
Improper sanitization of the value of the [srcset] attribute in
This issue affects all versions of AngularJS.
Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
4.8 Medium
CVSS3
4.3 Medium
CVSS3
Дефекты
Связанные уязвимости
Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
Improper sanitization of the value of the [srcset] attribute in <sourc ...
AngularJS allows attackers to bypass common image source restrictions
Уязвимость JavaScript-фреймворка для разработки одностраничных приложений АngularJS, связанная с неполной фильтрацией специальных элементов, позволяющая нарушителю обойти существующие ограничения безопасности и проводить спуфинг-атаки
EPSS
4.8 Medium
CVSS3
4.3 Medium
CVSS3