cve/2024/CVE-2024-8372.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-8372](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8372)
![](https://img.shields.io/static/v1?label=Product&message=AngularJS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D1.3.0-rc.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input&color=brighgreen)
### Description
** UNSUPPPORTED WHEN ASSIGNED ** Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .This issue affects AngularJS versions 1.3.0-rc.4 and greater.Note:The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
### POC
#### Reference
- https://www.herodevs.com/vulnerability-directory/cve-2024-8372
#### Github
- https://github.com/eleni1029/250714_Weakness_Scan
- https://github.com/zhanpengliu-tencent/medium-cve