High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2024-21490
HighVulnerability Description
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
**Note:**
This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Known Affected Software
71 configuration(s) from 1 vendor(s)
cpe:2.3:a:angularjs:angular.js:1.4.14:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.15:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.17:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.0:-:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.18:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.20:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.11:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.10:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.0:-:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.14:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.10:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.10:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.0:-:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.13:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.19:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.13:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.11:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.0:-:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.9:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.8:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.16:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.9.6:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:angularjs:angular.js:1.4.12:*:*:*:*:*:*:*
USN-7958-1
USN-7958-1: AngularJS vulnerabilities
References & Resources
-
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746report@snyk.io Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747report@snyk.io Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113report@snyk.io Third Party Advisory
-
https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redosreport@snyk.io Exploit Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2025/07/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
-
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redosaf854a3a-2127-422b-91ae-364da2661108 Exploit Third Party Advisory
-
https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoSaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
Severity Details
Key Information
- Published Date
- February 10, 2024
