CVE-2024-8372

CWE-12898 documents7 sources
Severity
4.3MEDIUM
EPSS
0.0%
top 96.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 9
Latest updateJan 14

Description

Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:LExploitability: 2.2 | Impact: 2.5

Affected Packages4 packages

NVDangularjs/angularjs1.3.11.8.3+1
CVEListV5google/angularjs>=1.3.0-rc.4
Debianangular.js< 1.8.3-1+deb12u1~deb11u1+3
npmangular1.3.0-rc.41.8.3

🔴Vulnerability Details

4
OSV
CVE-2024-8372: Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also2024-09-09
CVEList
AngularJS improper sanitization in 'srcset' attribute2024-09-09
OSV
AngularJS allows attackers to bypass common image source restrictions2024-09-09
GHSA
AngularJS allows attackers to bypass common image source restrictions2024-09-09

📋Vendor Advisories

3
Ubuntu
AngularJS vulnerabilities2026-01-14
Red Hat
angularjs: From NVD collector2024-09-09
Debian
CVE-2024-8372: angular.js - Improper sanitization of the value of the 'srcset' attribute in AngularJS allows...2024