cve/2023/CVE-2023-26118.md

25 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-26118](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26118)
![](https://img.shields.io/static/v1?label=Product&message=angular&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.bower%3Aangular&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.bowergithub.angular%3Aangular&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.npm%3Aangular&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=1.4.9%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen)
### Description
Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406326
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406328
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406327
- https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373046
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/patrikx3/redis-ui
2024-05-25 21:48:12 +02:00