Description
This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
Recommendation
No fix is available yet. Followings are affected versions:
- >= 1.3.0, <= 1.8.3
References
- GHSA-4w4v-5hc9-xrr2
- security.snyk.io
- stackblitz.com
- support.herodevs.com
- lists.debian.org
- CVE-2024-21490
- CWE-1333
- CAPEC-310
- OWASP 2021-A6
Related Issues
- Angular vulnerable to Cross-site Scripting - CVE-2020-7676
- AngularJS allows attackers to bypass common image source restrictions (GHSA-mqm9-c95h-x2p6) - CVE-2024-8373
- AngularJS allows attackers to bypass common image source restrictions - CVE-2024-8372
- angular vulnerable to regular expression denial of service via the angular.copy() utility - CVE-2023-26116
- Tags:
- npm
- angular
Anything's wrong? Let us know Last updated on November 03, 2025