CVE-2024-8372 Vulnerability Details

  /     /     /  

CVE-2024-8372 Metadata Quick Info

CVE Published: 09/09/2024 | CVE Updated: 22/11/2024 | CVE Year: 2024
Source: HeroDevs | Vendor: Google | Product: AngularJS
Status : PUBLISHED

CVE-2024-8372 Description

Improper sanitization of the value of the \'[srcset]\' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

Metrics

CVSS Version: 3.1 | Base Score: 4.8 MEDIUM
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* HIGH
    Privileges Required (PR)* NONE
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* NONE
    Integrity Impact (I)* LOW
    Availability Impact (A)* LOW

Weakness Enumeration (CWE)

CWE-ID: CWE-1289
CWE Name: CWE-1289: Improper Validation of Unsafe Equivalence in Input
Source: Google

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-554
CAPEC Description: CAPEC-554 Functionality Bypass


Source: NVD (National Vulnerability Database).