This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
**Note:**
This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
References
Link | Resource |
---|---|
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 | Third Party Advisory |
https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos | Exploit Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 | Third Party Advisory |
https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos | Exploit Third Party Advisory |
https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-10 05:15
Updated : 2025-01-16 12:15
NVD link : CVE-2024-21490
Mitre link : CVE-2024-21490
CVE.ORG link : CVE-2024-21490
JSON object : View
Products Affected
angularjs
- angular.js
CWE
CWE-1333
Inefficient Regular Expression Complexity