CVE-2020-7676

NameCVE-2020-7676
Descriptionangular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
angular.js (PTS)buster1.5.10-1vulnerable
bullseye1.8.2-2fixed
sid, trixie, bookworm1.8.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
angular.jssource(unstable)1.8.0-1

Notes

[buster] - angular.js <no-dsa> (Minor issue; can be fixed via point release)
[stretch] - angular.js <ignored> (Nodejs in stretch not covered by security support)
[jessie] - angular.js <no-dsa> (Minor issue, low usage of 2014-era Nodejs)
https://github.com/angular/angular.js/pull/17028
https://snyk.io/vuln/SNYK-JS-ANGULAR-570058

Search for package or bug name: Reporting problems