cve/2024/CVE-2024-8373.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-8373](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8373)
![](https://img.shields.io/static/v1?label=Product&message=AngularJS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D0.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements&color=brighgreen)
### Description
** UNSUPPPORTED WHEN ASSIGNED ** Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .This issue affects all versions of AngularJS.Note:The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
### POC
#### Reference
- https://www.herodevs.com/vulnerability-directory/cve-2024-8373
#### Github
- https://github.com/eleni1029/250714_Weakness_Scan
- https://github.com/zhanpengliu-tencent/medium-cve