### [CVE-2024-8373](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8373) ![](https://img.shields.io/static/v1?label=Product&message=AngularJS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D0.0.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements&color=brighgreen) ### Description ** UNSUPPPORTED WHEN ASSIGNED ** Improper sanitization of the value of the [srcset] attribute in HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .This issue affects all versions of AngularJS.Note:The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status . ### POC #### Reference - https://www.herodevs.com/vulnerability-directory/cve-2024-8373 #### Github - https://github.com/eleni1029/250714_Weakness_Scan - https://github.com/zhanpengliu-tencent/medium-cve