CVE-2024-8373

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-8373
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-8373.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-8373
Aliases
Related
Published
2024-09-09T15:15:12Z
Modified
2025-05-09T10:55:55.706397Z
Downstream
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing .

This issue affects all versions of AngularJS.

Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

References

Affected packages

Debian:11 / angular.js

Package

Name
angular.js
Purl
pkg:deb/debian/angular.js?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.2-2
1.8.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / angular.js

Package

Name
angular.js
Purl
pkg:deb/debian/angular.js?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / angular.js

Package

Name
angular.js
Purl
pkg:deb/debian/angular.js?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/angular/angular.js

Affected ranges

Type
GIT
Repo
https://github.com/angular/angular.js
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

g3-v1.*

g3-v1.0.0-rc2
g3-v1.0.0rc1

v0.*

v0.10.0
v0.10.1
v0.10.2
v0.10.3
v0.10.4
v0.10.5
v0.10.6
v0.9.0
v0.9.1
v0.9.10
v0.9.11
v0.9.12
v0.9.13
v0.9.14
v0.9.15
v0.9.16
v0.9.17
v0.9.18
v0.9.2
v0.9.3
v0.9.4
v0.9.5
v0.9.6
v0.9.7
v0.9.9

v1.*

v1.0.0
v1.0.0rc1
v1.0.0rc10
v1.0.0rc11
v1.0.0rc12
v1.0.0rc2
v1.0.0rc3
v1.0.0rc4
v1.0.0rc5
v1.0.0rc6
v1.0.0rc7
v1.0.0rc8
v1.0.0rc9
v1.0.1
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.1.4
v1.1.5
v1.2.0
v1.2.0-rc.2
v1.2.0-rc.3
v1.2.0rc1
v1.2.1
v1.2.10
v1.2.11
v1.2.12
v1.2.13
v1.2.14
v1.2.2
v1.2.3
v1.2.4
v1.2.5
v1.2.6
v1.2.7
v1.2.8
v1.2.9
v1.3.0
v1.3.0-beta.1
v1.3.0-beta.10
v1.3.0-beta.11
v1.3.0-beta.12
v1.3.0-beta.13
v1.3.0-beta.14
v1.3.0-beta.15
v1.3.0-beta.16
v1.3.0-beta.17
v1.3.0-beta.18
v1.3.0-beta.19
v1.3.0-beta.2
v1.3.0-beta.3
v1.3.0-beta.4
v1.3.0-beta.5
v1.3.0-beta.6
v1.3.0-beta.7
v1.3.0-beta.8
v1.3.0-beta.9
v1.3.0-rc.0
v1.3.0-rc.1
v1.3.0-rc.2
v1.3.0-rc.3
v1.3.0-rc.4
v1.3.0-rc.5
v1.3.1
v1.3.2
v1.3.3
v1.3.4
v1.3.5
v1.3.6
v1.3.7
v1.3.8
v1.4.0
v1.4.0-beta.0
v1.4.0-beta.1
v1.4.0-beta.2
v1.4.0-beta.3
v1.4.0-beta.4
v1.4.0-beta.5
v1.4.0-beta.6
v1.4.0-rc.0
v1.4.0-rc.1
v1.4.0-rc.2
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.5.0
v1.5.0-beta.0
v1.5.0-beta.1
v1.5.0-beta.2
v1.5.0-rc.0
v1.5.0-rc.1
v1.5.0-rc.2
v1.5.1
v1.6.0
v1.6.0-rc.0
v1.6.0-rc.1
v1.6.0-rc.2
v1.7.0
v1.7.0-rc.0
v1.8.0
v1.8.3