Bypassing Image Source Restrictions in AngularJS Through Improper Sanitization
CVE-2024-8373

4.3MEDIUM

Key Information:

Vendor
Google
Status
Vendor
CVE Published:
9 September 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A security issue exists in AngularJS due to improper sanitization of the 'srcset' attribute within HTML elements. This flaw permits attackers to bypass standard image source restrictions, which can result in content spoofing exploits. All versions of AngularJS are susceptible, and it is vital to note that the AngularJS project has reached End-of-Life, indicating it will not receive updates or patches to mitigate this vulnerability. Organizations using AngularJS should evaluate their application's exposure to potential exploitation.

Affected Version(s)

AngularJS 0.0.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)
.