Description
CVE-2024-8372 - Medium Severity Vulnerability
Vulnerable Library - angular-1.8.3.tgz
HTML enhanced for web apps
Library home page: https://registry.npmjs.org/angular/-/angular-1.8.3.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/angular-bootstrap-switch/node_modules/angular/package.json
Dependency Hierarchy:
- angular-bootstrap-switch-0.5.2.tgz (Root Library)
- ❌ angular-1.8.3.tgz (Vulnerable Library)
Found in HEAD commit: a5db0714038685437d759b29eb80b4b9e415b2c2
Found in base branch: master
Vulnerability Details
Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .
This issue affects AngularJS versions 1.3.0-rc.4 and greater.
Note:
The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
Publish Date: 2024-09-09
URL: CVE-2024-8372
CVSS 3 Score Details (4.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: Low
Step up your Open Source Security Game with Mend here