Protection Bypass Affecting angular Open this link in a new tab package, versions <1.2.2


0.0
high
  • Attack Complexity

    High

  • Confidentiality

    High

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    npm:angular:20131113

  • published

    23 Jan 2017

  • disclosed

    12 Nov 2013

  • credit

    Chirayu Krishnappa

Introduced: 12 Nov 2013

CWE-284 Open this link in a new tab

How to fix?

Upgrade angular to version 1.2.2 or higher.

Overview

angular is a package that lets you write client-side web applications as if you had a smarter browser. It also lets you use HTML as your template language and lets you extend HTML’s syntax to express your application’s components clearly and succinctly.

Affected versions of this package are vulnerable to Protection Bypass via ng-attr-action and ng-attr-srcdoc allowing binding to Javascript. The fix was to require bindings to form[action] to be $sce.RESOURCE_URL and bindings to iframe[srcdoc] to be $sce.HTML