This repository was archived by the owner on Aug 17, 2021. It is now read-only.

Description
CVE-2020-7676 - Medium Severity Vulnerability
Vulnerable Library - angular-1.2.28.js
AngularJS is an MVC framework for building web applications. The core features include HTML enhanced with custom component and data-binding capabilities, dependency injection and strong focus on simplicity, testability, maintainability and boiler-plate reduction.
Library home page: https://cdnjs.cloudflare.com/ajax/libs/angular.js/1.2.28/angular.js
Path to dependency file: angular-recaptcha/demo/usage.html
Path to vulnerable library: angular-recaptcha/demo/usage.html
Dependency Hierarchy:
- ❌ angular-1.2.28.js (Vulnerable Library)
Found in HEAD commit: 77ac10d02c2a528cc60997de38cad417d94af437
Found in base branch: master
Vulnerability Details
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "" elements in "" ones changes parsing behavior, leading to possibly unsanitizing code.
Publish Date: 2020-06-08
URL: CVE-2020-7676
CVSS 3 Score Details (5.4)
Base Score Metrics:
Exploitability Metrics:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: Required
Scope: Changed
Impact Metrics:
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7676
Release Date: 2020-06-08
Fix Resolution: 1.8.0