First published: Thu Mar 30 2023(Updated: )
All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Angularjs Angular | >=1.4.9<=1.8.3 | |
Fedoraproject Fedora | =38 | |
npm/angular | <=1.8.3 | |
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26118 is a vulnerability that affects all versions of the package angular and allows for Regular Expression Denial of Service (ReDoS) attacks.
CVE-2023-26118 has a severity rating of 5.3, which is considered medium.
Regular Expression Denial of Service (ReDoS) is a type of vulnerability where an attacker can exploit the way a regular expression is evaluated to cause a denial of service by overwhelming the system with a malicious input.
CVE-2023-26118 affects the angular package versions 1.4.9 to 1.8.3 and allows for ReDoS attacks when using the <input type="url"> element.
To fix CVE-2023-26118, update your angular package to a version that is not vulnerable, starting from 1.8.4.