Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Angular | Angularjs | 1.4.9 (including) | 1.8.3 (including) |
Angular.js | Ubuntu | bionic | * |
Angular.js | Ubuntu | kinetic | * |
Angular.js | Ubuntu | lunar | * |
Angular.js | Ubuntu | mantic | * |
Angular.js | Ubuntu | trusty | * |
Angular.js | Ubuntu | xenial | * |
Attackers can create crafted inputs that
intentionally cause the regular expression to use
excessive backtracking in a way that causes the CPU
consumption to spike.