CVE-2024-21490
Description
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
**Note:**
This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
CWE
- CWE-1333 — Regular Expression Denial of Service (ReDoS)
Affected
- n/a / angular — v=1.3.0 <* [affected]
- n/a / org.webjars.bower:angular — v=1.3.0 <* [affected]
- n/a / org.webjars.npm:angular — v=1.3.0 <* [affected]
CVSS
- 3.1 score=7.5 severity=HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P
References
- https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746
- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747
- https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos
Source
cvelistV5-main/cves/2024/21xxx/CVE-2024-21490.json