Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4242-1 | angular.js security update |
EUVD |
EUVD-2023-0831 | Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. |
Github GHSA |
GHSA-2qqx-w9hr-q5gx | angular vulnerable to regular expression denial of service via the $resource service |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-02-14T15:38:14.201Z
Reserved: 2023-02-20T10:28:48.923Z
Link: CVE-2023-26117
Updated: 2024-08-02T11:39:06.639Z
Status : Modified
Published: 2023-03-30T05:15:07.687
Modified: 2025-02-14T16:15:33.197
Link: CVE-2023-26117
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA