First published: Thu Mar 30 2023(Updated: )
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Angularjs Angular | >=1.0.0<=1.8.3 | |
Fedoraproject Fedora | =38 | |
npm/angular | <=1.8.3 | |
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-26117.
The package affected by this vulnerability is Angularjs Angular.
The severity of CVE-2023-26117 is medium with a CVSS score of 5.3.
The vulnerability can be exploited by using a large carefully-crafted input, resulting in catastrophic backtracking.
Yes, you can refer to the following links: [link1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQWJLE5WE33WNMA54XSJIDXBRK2KL3XJ/), [link2](https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323), [link3](https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325).