cve/2024/CVE-2024-21490.md

25 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-21490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21490)
![](https://img.shields.io/static/v1?label=Product&message=angular&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.bower%3Aangular&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.npm%3Aangular&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.3.0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen)
### Description
2024-06-22 09:37:59 +00:00
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. **Note:** This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
2024-05-25 21:48:12 +02:00
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747
- https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113
2024-07-25 21:25:12 +00:00
- https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS
2024-05-25 21:48:12 +02:00
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/eleni1029/250714_Weakness_Scan
2024-05-25 21:48:12 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/patrikx3/redis-ui