AngularJS Vulnerability Allows Bypass of Image Source Restrictions and Content Spoofing
CVE-2024-8372

4.8MEDIUM

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
9 September 2024

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2024-8372?

The vulnerability exists due to improper sanitization of the '[srcset]' attribute in AngularJS, which can allow attackers to bypass standard image source restrictions. This loophole poses significant security risks by enabling potential content spoofing. As the AngularJS project has reached its End-of-Life status, no further updates or patches will be issued to rectify this vulnerability. It is crucial for users still utilizing affected versions to consider migrating to supported frameworks to ensure ongoing security.

Affected Version(s)

AngularJS >=1.3.0-rc.4

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2024-8372 : AngularJS Vulnerability Allows Bypass of Image Source Restrictions and Content Spoofing