Arbitrary Code Execution Vulnerability in Angular Expressions Patched
CVE-2024-54152

Currently unrated

Key Information:

Vendor

Peerigon

Vendor
CVE Published:
10 December 2024

Badges

πŸ“ˆ Score: 450🟣 EPSS 25%πŸ“° News Worthy

What is CVE-2024-54152?

CVE-2024-54152 is a vulnerability affecting Angular Expressions, a standalone module of the Angular.JS web framework developed by Peerigon. This issue allows attackers to exploit the Angular Expressions module by crafting a malicious expression that can escape its sandbox environment, leading to arbitrary code execution on the affected system. The vulnerability is particularly concerning for organizations that utilize this framework for web application development, as successful exploitation can result in unauthorized access and control over system resources, potentially compromising sensitive data and overall operational integrity.

Technical Details

The vulnerability is present in versions of Angular Expressions prior to 1.4.3. An attacker can exploit this flaw by submitting a cleverly constructed payload that escapes the limitations of the sandboxing mechanism. This results in the execution of arbitrary code, thereby circumventing the expected security boundaries. The vulnerability has been addressed in version 1.4.3, which contains patches designed to prevent the unauthorized execution of malicious expressions. Alternatively, two workarounds are available: either globally disabling access to the __proto__ property or ensuring that the function is invoked with a single argument to mitigate the risk.

Potential Impact of CVE-2024-54152

  1. Unauthorized System Access: Exploitation of this vulnerability could enable attackers to gain unauthorized access to the server, leading to potential data breaches and unauthorized manipulation of system functions.

  2. Data Integrity Compromise: The ability to execute arbitrary code can allow attackers to modify, delete, or exfiltrate sensitive information, jeopardizing the data integrity of affected systems.

  3. Operational Disruption: Successful attacks leveraging this vulnerability might result in the execution of malicious scripts that can disrupt regular business operations, potentially leading to service outages and financial losses for organizations.

Affected Version(s)

angular-expressions < 1.4.3

News Articles

Angular Expressions Vulnerability Let Attackers Gain Full System Access

A critical security vulnerability in Angular Expressions, a standalone module for the Angular.JS web framework, has been discovered, potentially allowing attackers to execute arbitrary code and gain full system access.

References

EPSS Score

25% chance of being exploited in the next 30 days.

Timeline

  • πŸ“°

    First article discovered by Cyber Security News

  • Vulnerability published

  • Vulnerability Reserved

.