CVE-2024-8373

CWE-7918 documents7 sources
Severity
4.3MEDIUM
EPSS
0.0%
top 97.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 9
Latest updateJan 14

Description

Improper sanitization of the value of the [srcset] attribute in HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:LExploitability: 2.2 | Impact: 2.5

Affected Packages4 packages

CVEListV5google/angularjs>=0.0.0
Debianangular.js< 1.8.3-1+deb12u1~deb11u1+3
npmangular1.8.3

🔴Vulnerability Details

4
CVEList
AngularJS improper sanitization in '<source>' element2024-09-09
OSV
CVE-2024-8373: Improper sanitization of the value of the [srcset] attribute in HTML elements in AngularJS allows attackers to bypass common image source restrictions2024-09-09
OSV
AngularJS allows attackers to bypass common image source restrictions2024-09-09
GHSA
AngularJS allows attackers to bypass common image source restrictions2024-09-09

📋Vendor Advisories

3
Ubuntu
AngularJS vulnerabilities2026-01-14
Red Hat
angular: From NVD collector2024-09-09
Debian
CVE-2024-8373: angular.js - Improper sanitization of the value of the [srcset] attribute in <source> HTML el...2024
CVE-2024-8373 (MEDIUM CVSS 4.3) | Improper sanitization of the value | cvebase.io