5.3 CVE-2023-26117

Exploit
 

Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
https://nvd.nist.gov/vuln/detail/CVE-2023-26117

Categories

CWE-1333 : Inefficient Regular Expression Complexity
Some regular expression engines have a feature called "backtracking". If the token cannot match, the engine "backtracks" to a position that may result in a different token that can match.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:angularjs:angularjs:*:*:*:*:*:*:*:* >= 1.0.0 <= 1.8.3
Configuration 2
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045
https://stackblitz.com/edit/angularjs-vulnerability-resource-trailing-slashes...
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-5406323
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-5406325
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-5406324
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-3373045
https://stackblitz.com/edit/angularjs-vulnerability-resource-trailing-slashes...


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
492 Regular Expression Exponential Blowup