First published: Sat Feb 10 2024(Updated: )
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. **Note:** This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
Credit: report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.webjars.bower:angular | >=1.3.0<=1.8.3 | |
maven/org.webjars.npm:angular | >=1.3.0<=1.8.3 | |
npm/angular | >=1.3.0<=1.8.3 | |
AngularJS | >=1.3.0 | |
Angular | >=1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21490 is classified as a denial of service vulnerability due to potential catastrophic backtracking in regular expressions.
To fix CVE-2024-21490, upgrade the Angular package to a version higher than 1.8.3.
CVE-2024-21490 affects Angular versions from 1.3.0 to 1.8.3.
The impact of CVE-2024-21490 is a potential denial of service due to performance degradation from super-linear runtime.
CVE-2024-21490 affects angular packages from org.webjars.bower, org.webjars.npm, and npm for Angular.