CVE-2024-8372
Sept. 17, 2024, 5:24 p.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
angularjs |
|
|
Description
Improper sanitization of the value of the '[srcset]' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
Weaknesses
CWE-1289
Improper Validation of Unsafe Equivalence in Input
The product receives an input value that is used as a resource identifier or other type of reference, but it does not validate or incorrectly validates that the input is equivalent to a potentially-unsafe value.
CWE ID: 1289Date
Published: Sept. 9, 2024, 3:15 p.m.
Last Modified: Sept. 17, 2024, 5:24 p.m.
Status : Analyzed
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
36c7be3b-2937-45df-85ea-ca7133ea542c
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | angularjs | angular.js | / | / | / | / | / | / | / | / |
a | angularjs | angular.js | 1.3.0 | rc4 | / | / | / | / | / | / |
a | angularjs | angular.js | 1.3.0 | rc5 | / | / | / | / | / | / |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
Base Score
Exploitability Score
Impact Score
Base Severity
MEDIUMCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N