CVE-2023-26117

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-26117
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-26117.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-26117
Aliases
Downstream
Published
2023-03-30T05:15:07.687Z
Modified
2025-11-15T06:21:00.059907Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

References

Affected packages

Git / github.com/angular/angular.js

Affected ranges

Type
GIT
Repo
https://github.com/angular/angular.js
Events

Affected versions

v1.*

v1.0.0
v1.0.1
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.1.4
v1.1.5
v1.2.0
v1.2.0-rc.2
v1.2.0-rc.3
v1.2.0rc1
v1.2.1
v1.2.10
v1.2.11
v1.2.12
v1.2.13
v1.2.14
v1.2.2
v1.2.3
v1.2.4
v1.2.5
v1.2.6
v1.2.7
v1.2.8
v1.2.9
v1.3.0
v1.3.0-beta.1
v1.3.0-beta.10
v1.3.0-beta.11
v1.3.0-beta.12
v1.3.0-beta.13
v1.3.0-beta.14
v1.3.0-beta.15
v1.3.0-beta.16
v1.3.0-beta.17
v1.3.0-beta.18
v1.3.0-beta.19
v1.3.0-beta.2
v1.3.0-beta.3
v1.3.0-beta.4
v1.3.0-beta.5
v1.3.0-beta.6
v1.3.0-beta.7
v1.3.0-beta.8
v1.3.0-beta.9
v1.3.0-rc.0
v1.3.0-rc.1
v1.3.0-rc.2
v1.3.0-rc.3
v1.3.0-rc.4
v1.3.0-rc.5
v1.3.1
v1.3.2
v1.3.3
v1.3.4
v1.3.5
v1.3.6
v1.3.7
v1.3.8
v1.4.0
v1.4.0-beta.0
v1.4.0-beta.1
v1.4.0-beta.2
v1.4.0-beta.3
v1.4.0-beta.4
v1.4.0-beta.5
v1.4.0-beta.6
v1.4.0-rc.0
v1.4.0-rc.1
v1.4.0-rc.2
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.5.0
v1.5.0-beta.0
v1.5.0-beta.1
v1.5.0-beta.2
v1.5.0-rc.0
v1.5.0-rc.1
v1.5.0-rc.2
v1.5.1
v1.6.0
v1.6.0-rc.0
v1.6.0-rc.1
v1.6.0-rc.2
v1.7.0
v1.7.0-rc.0
v1.8.0
v1.8.3

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-26117.json"