CVE-2024-21490:
angular vulnerable to super-linear runtime due to backtracking
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.69078%
CWE
Published
2/10/2024
Updated
5/14/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
angular | npm | >= 1.3.0, <= 1.8.3 | |
org.webjars.npm:angular | maven | >= 1.3.0, <= 1.8.3 | |
org.webjars.bower:angular | maven | >= 1.3.0, <= 1.8.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly identifies the ng-srcset directive's value splitting regex as the root cause. While exact implementation details aren't provided in available sources, AngularJS architecture dictates that srcset handling would be implemented in directive processing code. The confidence is high because:
- The advisory specifically calls out ng-srcset as the vulnerable directive
- ReDoS vulnerabilities in this context typically stem from the regex used for attribute parsing
- AngularJS 1.x's EOL status matches the affected versions
- Multiple independent sources (NVD, Snyk, GHSA) confirm the attack vector involves ng-srcset processing