org.webjars.npm:angular@1.0.6 vulnerabilities
-
latest version
1.8.3
-
first published
9 years ago
-
latest version published
2 years ago
-
licenses detected
- [1.0.0,)
-
package manager
Direct Vulnerabilities
Known vulnerabilities in the org.webjars.npm:angular package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Incomplete Filtering of Special Elements. The Note: The How to fix Incomplete Filtering of Special Elements? There is no fixed version for |
[0,)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the How to fix Regular Expression Denial of Service (ReDoS)? There is no fixed version for |
[1.0.0,)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to insecure page caching in the Internet Explorer browser, which allows interpolation of How to fix Cross-site Scripting (XSS)? There is no fixed version for |
[0,)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). XSS may be triggered in AngularJS applications that sanitize user-controlled HTML snippets before passing them to JQLite (DOM manipulation library that's part of AngularJS) manipulates input HTML before inserting it to the DOM in One of the modifications performed expands an XHTML self-closing tag. If PoC
Note that the style element is not closed and
This will alert, as How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.8.0)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The regex-based input HTML replacement may turn sanitized code into unsanitized one.
Wrapping How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.8.0)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Denial of Service (DoS). None How to fix Denial of Service (DoS)? Upgrade |
[,1.6.3)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). None How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.6.5)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.6.0-rc.2)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) through SVG files if How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.6.9)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
Browsers mutate attributes values such as Here is an example of what could happen:
The sanitizer contains a bit of code that triggers this mutation on an inert piece of DOM, before angular sanitizes it. Note: Chrome 62 does not appear to mutate this particular string any more, instead it just leaves the "whitespace" in place. This probably means that Chrome 62 is no longer vulnerable to this specific attack vector. How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.6.7)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to JSONP Callback Attack. Any url could perform JSONP requests, allowing full access to the browser and the JavaScript context. This can lead to Cross-site Scripting. How to fix JSONP Callback Attack? Upgrade |
[,1.6.1)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Arbitrary Script Injection. Attributes were not protected via
By default, How to fix Arbitrary Script Injection? Upgrade |
[1.0.0,1.2.30)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS)
via the SVG An example of a malicious SVG document would be: SVG to sanitize:
External SVG file (test.svg):
Here the SVG to sanitize loads in the How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.5.0-rc.0)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) attacks involving assignment on How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.4.10)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
This error occurs when mXSS attack exploit browser bugs that cause some browsers parse a certain html strings into DOM, which once serialized doesn't match the original input. These browser bugs can be exploited by attackers to create payload which looks harmless to sanitizers, but due to mutations caused by the browser are turned into dangerous code once processed after sanitization. How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.5.0-beta.2)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to no proper sanitization of How to fix Cross-site Scripting (XSS)? Upgrade |
[1.0.0,1.5.0-beta.0)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Arbitrary Code Execution via unsafe svg animation tags. How to fix Arbitrary Code Execution? Upgrade |
[,1.4.0)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Arbitrary Command Execution due to the assignment functions accessing constructors functions, allowing attackers to execute their malicious code. How to fix Arbitrary Command Execution? Upgrade |
[,1.3.2)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to unsanitized URIs in How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.3.0-rc.4)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Arbitrary Code Execution.
How to fix Arbitrary Code Execution? Upgrade |
[,1.3.0)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Protection Bypass via How to fix Protection Bypass? Upgrade |
[,1.2.2)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Arbitrary Script Injection due to improper sanitization of the How to fix Arbitrary Script Injection? Upgrade |
[,1.1.5)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS)
Concatenating expressions makes it hard to reason about whether some combination of concatenated values are unsafe to use and could easily lead to XSS. By requiring that a single expression be used for To migrate your code, follow the example below: Before:
After:
##Details A cross-site scripting attack occurs when the attacker tricks a legitimate web-based application or site to accept a request as originating from a trusted source. This is done by escaping the context of the web application; the web application then delivers that data to its users along with other trusted dynamic content, without validating it. The browser unknowingly executes malicious script on the client side (through client-side languages; usually JavaScript or HTML) in order to perform actions that are otherwise typically blocked by the browser’s Same Origin Policy. ֿInjecting malicious code is the most prevalent manner by which XSS is exploited; for this reason, escaping characters in order to prevent this manipulation is the top method for securing code against this vulnerability. Escaping means that the application is coded to mark key characters, and particularly key characters included in user input, to prevent those characters from being interpreted in a dangerous context. For example, in HTML, The most prominent use of XSS is to steal cookies (source: OWASP HttpOnly) and hijack user sessions, but XSS exploits have been used to expose sensitive information, enable access to privileged services and functionality and deliver malware. Types of attacksThere are a few methods by which XSS can be manipulated:
Affected environmentsThe following environments are susceptible to an XSS attack:
How to preventThis section describes the top best practices designed to specifically protect your code:
How to fix Cross-site Scripting (XSS)? Upgrade |
[1.0.0,1.2.0)
| |||||||||||||||
org.webjars.npm:angular is a WebJar for angular. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). DOM event handlers await events to occur (e.g. onclick, onkeypress, etc) and execute arbitrary Javascript code in accordance to the event. By default, interpolations inside DOM event handlers are disallowed. Using an interpolation for such handlers means that the interpolated value is a JS string being evaluated. Storing or generating such strings is error prone and likely leads to a Cross-site Scripting (XSS) vulnerability if you're not careful. On the other hand, ng-click and such event handlers evaluate Angular expressions that are a lot safer (e.g. No direct access to global objects - only scope), cleaner and harder to exploit. To migrate the code follow the example below: Before:
After:
How to fix Cross-site Scripting (XSS)? Upgrade |
[,1.2.0)
|