AngularJS Vulnerability Allows Bypass of Image Source Restrictions and Content Spoofing
CVE-2024-8372

4.3MEDIUM

Key Information:

Vendor
Google
Status
Vendor
CVE Published:
9 September 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The vulnerability exists due to improper sanitization of the '[srcset]' attribute in AngularJS, which can allow attackers to bypass standard image source restrictions. This loophole poses significant security risks by enabling potential content spoofing. As the AngularJS project has reached its End-of-Life status, no further updates or patches will be issued to rectify this vulnerability. It is crucial for users still utilizing affected versions to consider migrating to supported frameworks to ensure ongoing security.

Affected Version(s)

AngularJS 1.3.0-rc.4

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)
.