First published: Mon Sep 09 2024(Updated: )
Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .
Credit: 36c7be3b-2937-45df-85ea-ca7133ea542c 36c7be3b-2937-45df-85ea-ca7133ea542c
Affected Software | Affected Version | How to fix |
---|---|---|
npm/angular | <=1.8.3 | |
AngularJS | <1.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8373 has been classified as a significant severity vulnerability due to its potential to allow content spoofing.
To fix CVE-2024-8373, update to AngularJS version 1.9.6 or later, which addresses the improper sanitization issue.
CVE-2024-8373 affects AngularJS versions up to 1.8.3 and versions prior to 1.9.6.
CVE-2024-8373 can facilitate content spoofing attacks by bypassing image source restrictions.
Yes, if you are using an affected version of AngularJS, your website could be vulnerable to content spoofing due to CVE-2024-8373.