This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
**Note:**
This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
References
Link | Resource |
---|---|
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 | Third Party Advisory |
https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos | Exploit Third Party Advisory |
https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS | Third Party Advisory |
Configurations
History
10 Oct 2024, 13:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Angularjs
Angularjs angular.js |
|
References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 - Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 - Third Party Advisory | |
References | () https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS - Third Party Advisory | |
CPE | cpe:2.3:a:angularjs:angular.js:*:*:*:*:*:*:*:* |
14 May 2024, 14:54
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Mar 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. **Note:** This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core). |
16 Feb 2024, 13:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 - Third Party Advisory | |
References | () https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos - Exploit, Third Party Advisory | |
First Time |
Angular
Angular angular |
|
CWE | CWE-1333 |
10 Feb 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-10 05:15
Updated : 2024-10-10 13:51
NVD link : CVE-2024-21490
Mitre link : CVE-2024-21490
CVE.ORG link : CVE-2024-21490
JSON object : View
Products Affected
angularjs
- angular.js
CWE
CWE-1333
Inefficient Regular Expression Complexity