Remote Code Execution (RCE) Affecting angular-expressions package, versions <1.0.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    3.32% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-ANGULAREXPRESSIONS-543284
  • published 26 Jan 2020
  • disclosed 26 Jan 2020
  • credit Unknown

How to fix?

Upgrade angular-expressions to version 1.0.1 or higher.

Overview

angular-expressions is an Angular expression as standalone module.

Affected versions of this package are vulnerable to Remote Code Execution (RCE) when expressions.compile(userControlledInput) is called where userControlledInput is text that comes from user input. If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
8.7 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    Required
  • Scope (S)
    Changed
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    None
Expand this section

NVD

8.8 high