Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"introduced": "1.4.9"
},
{
"fixed": "*"
},
{
"introduced": "1.4.9"
},
{
"fixed": "*"
},
{
"introduced": "1.4.9"
},
{
"fixed": "*"
},
{
"fixed": "*"
}
],
"source": "AFFECTED_FIELD"
}
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/26xxx/CVE-2023-26118.json",
"cna_assigner": "snyk",
"cwe_ids": [
"CWE-1333"
]
}