Description
CVE-2023-26117 - Medium Severity Vulnerability
Vulnerable Library - angular-1.8.3.tgz
HTML enhanced for web apps
Library home page: https://registry.npmjs.org/angular/-/angular-1.8.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/angular-bootstrap-switch/node_modules/angular/package.json
Dependency Hierarchy:
- angular-bootstrap-switch-0.5.2.tgz (Root Library)
- ❌ angular-1.8.3.tgz (Vulnerable Library)
Found in HEAD commit: a5db0714038685437d759b29eb80b4b9e415b2c2
Found in base branch: master
Vulnerability Details
Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
Publish Date: 2023-03-30
URL: CVE-2023-26117
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Step up your Open Source Security Game with Mend here