cve/2024/CVE-2024-21490.md
2024-06-09 00:33:16 +00:00

26 lines
1.5 KiB
Markdown

### [CVE-2024-21490](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21490)
![](https://img.shields.io/static/v1?label=Product&message=angular&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.bower%3Aangular&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=org.webjars.npm%3Aangular&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.3.0%3C%20*%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Regular%20Expression%20Denial%20of%20Service%20(ReDoS)&color=brighgreen)
### Description
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
**Note:**
This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747
- https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113
- https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/patrikx3/redis-ui