Логотип exploitDog
bind:CVE-2026-27739
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-27739

Количество 3

Количество 3

nvd логотип

CVE-2026-27739

около 1 месяца назад

The Angular SSR is a server-rise rendering tool for Angular applications. Versions prior to 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 have a Server-Side Request Forgery (SSRF) vulnerability in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and `X-Forwarded-*` family to determine the application's base origin without any validation of the destination domain. Specifically, the framework didn't have checks for the host domain, path and character sanitization, and port validation. This vulnerability manifests in two primary ways: implicit relative URL resolution and explicit manual construction. When successfully exploited, this vulnerability allows for arbitrary internal request steering. This can lead to credential exfiltration, internal network probing, and a confidentiality breach. In order to be vulnerable, the victim application mu

EPSS: Низкий
debian логотип

CVE-2026-27739

около 1 месяца назад

The Angular SSR is a server-rise rendering tool for Angular applicatio ...

EPSS: Низкий
github логотип

GHSA-x288-3778-4hhx

около 1 месяца назад

Angular SSR is vulnerable to SSRF and Header Injection via request handling pipeline

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-27739

The Angular SSR is a server-rise rendering tool for Angular applications. Versions prior to 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 have a Server-Side Request Forgery (SSRF) vulnerability in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and `X-Forwarded-*` family to determine the application's base origin without any validation of the destination domain. Specifically, the framework didn't have checks for the host domain, path and character sanitization, and port validation. This vulnerability manifests in two primary ways: implicit relative URL resolution and explicit manual construction. When successfully exploited, this vulnerability allows for arbitrary internal request steering. This can lead to credential exfiltration, internal network probing, and a confidentiality breach. In order to be vulnerable, the victim application mu

0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-27739

The Angular SSR is a server-rise rendering tool for Angular applicatio ...

0%
Низкий
около 1 месяца назад
github логотип
GHSA-x288-3778-4hhx

Angular SSR is vulnerable to SSRF and Header Injection via request handling pipeline

0%
Низкий
около 1 месяца назад

Уязвимостей на страницу