Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-26118

Опубликовано: 30 мар. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

A flaw was found in AngularJS, where it is vulnerable to a denial of service caused by a regular expression denial of service (ReDoS) flaw in the input[url] functionality. By providing specially-crafted regex input, a remote attacker can cause a denial of service.

Отчет

In Quay 3.10 and above, no version of affected momentjs is present.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.1servicemesh-grafanaWill not fix
Red Hat Ansible Tower 3angularNot affected
Red Hat Ansible Tower 3angularjsNot affected
Red Hat Ceph Storage 3grafanaOut of support scope
Red Hat Ceph Storage 4rhceph/rhceph-4-dashboard-rhel8Affected
Red Hat CodeReady Studio 12angularjsOut of support scope
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 7firefoxNot affected
Red Hat Enterprise Linux 7thunderbirdNot affected
Red Hat Enterprise Linux 8firefoxNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2183110angularjs: Regular Expression Denial of Service via the <input type="url"> element

EPSS

Процентиль: 64%
0.00475
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
nvd
почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVSS3: 5.3
debian
почти 3 года назад

Versions of the package angular from 1.4.9 are vulnerable to Regular E ...

CVSS3: 5.3
github
почти 3 года назад

angular vulnerable to regular expression denial of service via the <input type="url"> element

CVSS3: 5.3
fstec
почти 3 года назад

Уязвимость функции input[url] среды проектирования приложений и платформы разработки одностраничных приложений Аngular, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 64%
0.00475
Низкий

5.3 Medium

CVSS3