CVE-2024-54152

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-54152
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-54152.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-54152
Aliases
Related
Published
2024-12-10T16:15:23Z
Modified
2025-01-15T05:16:24.406680Z
Summary
[none]
Details

Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to __proto__ globally or make sure that one uses the function with just one argument.

References

Affected packages

Git / github.com/peerigon/angular-expressions

Affected ranges

Type
GIT
Repo
https://github.com/peerigon/angular-expressions
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.1.1
v1.1.10
v1.1.2
v1.1.3
v1.1.4
v1.1.5
v1.1.6
v1.1.7
v1.1.8
v1.1.9
v1.2.0
v1.2.1
v1.3.0
v1.4.0
v1.4.2