Search for packages
| purl | pkg:npm/angular@1.5.7 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1nqc-e1g6-e3bf
Aliases: GHSA-28hp-fgcr-2r4h GMS-2019-114 |
Cross-Site Scripting via JSONP JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors. |
Affected by 15 other vulnerabilities. |
|
VCID-1x1p-ye9j-rug4
Aliases: CVE-2024-8372 GHSA-m9gf-397r-hwpg |
Improper sanitization of the value of the `[srcset]` attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status . | There are no reported fixed by versions. |
|
VCID-2m5b-zvmc-pygf
Aliases: GMS-2017-134 |
XSS in $sanitize in Safari/Firefox Both Firefox and Safari are vulnerable to XSS if we use an inert document created via `document.implementation.createHTMLDocument()`. |
Affected by 12 other vulnerabilities. |
|
VCID-6map-62jp-tkgu
Aliases: CVE-2023-26117 GHSA-2qqx-w9hr-q5gx |
angular vulnerable to regular expression denial of service via the $resource service All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. | There are no reported fixed by versions. |
|
VCID-7p32-5sdx-j3hq
Aliases: GMS-2017-115 |
Denial of service in $sanitize Running $sanitize on bad HTML can freeze the browser. The problem occurs with clobbered data; typically the "nextSibling" property on an element is changed to one of it's child node, this makes it impossible to walk the HTML tree and leads to an infinite loop which freezes the browser. |
Affected by 13 other vulnerabilities. |
|
VCID-8juz-913g-zfdb
Aliases: CVE-2024-21490 GHSA-4w4v-5hc9-xrr2 |
angular vulnerable to super-linear runtime due to backtracking This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. **Note:** This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core). | There are no reported fixed by versions. |
|
VCID-9nuw-8wc1-vkc4
Aliases: GMS-2016-73 |
Bypass CSP protection Extension URIs (`resource://...`) bypass ````Content-Security-Policy```` in Chrome and Firefox and can always be loaded. Now if a site already has a XSS bug, and uses CSP to protect itself, but the user has an extension installed that uses Angular, an attacked can load Angular from the extension, and Angular's auto-bootstrapping can be used to bypass the victim site's CSP protection. |
Affected by 16 other vulnerabilities. Affected by 16 other vulnerabilities. Affected by 15 other vulnerabilities. |
|
VCID-cfxn-m6af-2kb8
Aliases: CVE-2024-8373 GHSA-mqm9-c95h-x2p6 |
Improper sanitization of the value of the `[srcset]` attribute in `<source>` HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status . | There are no reported fixed by versions. |
|
VCID-cpwp-gasq-kffz
Aliases: CVE-2023-26118 GHSA-qwqh-hm9m-p5hr |
angular vulnerable to regular expression denial of service via the <input type="url"> element All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. | There are no reported fixed by versions. |
|
VCID-dxq2-dfym-3fcv
Aliases: GMS-2018-9 |
Cross Site Scripting On Firefox there is a XSS vulnerability if a malicious attacker can write into the `xml:base` attribute on an SVG anchor. |
Affected by 11 other vulnerabilities. |
|
VCID-njvf-2y8u-5kfw
Aliases: CVE-2025-0716 GHSA-j58c-ww9w-pwp5 |
AngularJS improperly sanitizes SVG elements Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status . | There are no reported fixed by versions. |
|
VCID-qwfu-v1x6-e3ep
Aliases: CVE-2023-26116 GHSA-2vrf-hf26-jrp5 |
angular vulnerable to regular expression denial of service via the angular.copy() utility All versions of the package angular are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking. | There are no reported fixed by versions. |
|
VCID-rcvr-9ews-tfab
Aliases: GHSA-5cp4-xmrw-59wf GMS-2020-703 |
XSS via JQLite DOM manipulation functions in AngularJS ### Summary XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to `JQLite` methods like `JQLite.prepend`, `JQLite.after`, `JQLite.append`, `JQLite.replaceWith`, `JQLite.append`, `new JQLite` and `angular.element`. ### Description JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in `jqLiteBuildFragment`. One of the modifications performed [expands an XHTML self-closing tag](https://github.com/angular/angular.js/blob/418355f1cf9a9a9827ae81d257966e6acfb5623a/src/jqLite.js#L218). If `jqLiteBuildFragment` is called (e.g. via `new JQLite(aString)`) with user-controlled HTML string that was sanitized (e.g. with [DOMPurify](https://github.com/cure53/DOMPurify)), the transformation done by JQLite may modify some forms of an inert, sanitized payload into a payload containing JavaScript - and trigger an XSS when the payload is inserted into DOM. This is similar to a bug in jQuery `htmlPrefilter` function that was [fixed in 3.5.0](https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/). ### Proof of concept ```javascript const inertPayload = `<div><style><style/><img src=x onerror="alert(1337)"/>` ``` Note that the style element is not closed and `<img` would be a text node inside the style if inserted into the DOM as-is. As such, some HTML sanitizers would leave the `<img` as is without processing it and stripping the `onerror` attribute. ```javascript angular.element(document).append(inertPayload); ``` This will alert, as `<style/>` will be replaced with `<style></style>` before adding it to the DOM, closing the style element early and reactivating `img`. ### Patches The issue is patched in `JQLite` bundled with angular 1.8.0. AngularJS users using JQuery should upgrade JQuery to 3.5.0, as a similar vulnerability [affects jQuery <3.5.0](https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2). ### Workarounds Changing sanitizer configuration not to allow certain tag grouping (e.g. `<option><style></option>`) or inline style elements may stop certain exploitation vectors, but it's uncertain if all possible exploitation vectors would be covered. Upgrade of AngularJS to 1.8.0 is recommended. ### References https://github.com/advisories/GHSA-mhp6-pxh8-r675 https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2 https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6 https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://snyk.io/vuln/SNYK-JS-ANGULAR-570058 |
Affected by 9 other vulnerabilities. |
|
VCID-rvrc-5q4c-63bh
Aliases: CVE-2020-7676 GHSA-mhp6-pxh8-r675 |
Angular vulnerable to Cross-site Scripting angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping `<option>` elements in `<select>` ones changes parsing behavior, leading to possibly unsanitizing code. |
Affected by 9 other vulnerabilities. |
|
VCID-tbpx-hrpt-gkej
Aliases: CVE-2022-25869 GHSA-prc3-vjfx-vhm9 |
Angular (deprecated package) Cross-site Scripting All versions of package angular are vulnerable to Cross-site Scripting (XSS) due to insecure page caching in the Internet Explorer browser, which allows interpolation of `<textarea>` elements. NPM package [angular](https://www.npmjs.com/package/angular) is deprecated. Those who want to receive security updates should use the actively maintained package [@angular/core](https://www.npmjs.com/package/@angular/core). | There are no reported fixed by versions. |
|
VCID-xd5a-s1n3-bkhg
Aliases: CVE-2019-10768 GHSA-89mq-4x47-5v83 |
angular Prototype Pollution vulnerability Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation Upgrade to version 1.7.9 or later. The function was already deprecated and upgrades are not expected to break functionality. |
Affected by 11 other vulnerabilities. |
|
VCID-yjab-2vra-zug8
Aliases: GMS-2017-110 |
Bypass CSP protection , AngularJS allows bootstrapping of invalid/bad svg and currentScript if it was clobbered. |
Affected by 13 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||