NA

CVE-2023-26118

Published: 30/03/2023 Updated: 07/11/2023
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

angularjs angular

fedoraproject fedora 38

Vendor Advisories

Debian Bug report logs - #1036694 angularjs: CVE-2022-25869 CVE-2023-26116 CVE-2023-26117 CVE-2023-26118 Package: src:angularjs; Maintainer for src:angularjs is Laszlo Boszormenyi (GCS) &lt;gcs@debianorg&gt;; Reported by: Moritz Mühlenhoff &lt;jmm@inutilorg&gt; Date: Wed, 24 May 2023 12:45:01 UTC Severity: important Tags: ...
DescriptionThe MITRE CVE dictionary describes this issue as: All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the &lt;input type="url"&gt; element due to the usage of an insecure regular expression in the input[url] functionality Exploiting this vulnerability is possible by a large carefully-cr ...