Lucene search

K
cve[email protected]CVE-2023-28444
HistoryMar 24, 2023 - 8:15 p.m.

CVE-2023-28444

2023-03-2420:15:15
CWE-200
CWE-538
web.nvd.nist.gov
38
cve-2023-28444
angular
server
configuration
environment variables
typescript
docker
deployment
security
vulnerability

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L

0.001 Low

EPSS

Percentile

49.1%

angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during build time of an Angular CLI project. The detected environment variables are written to a ngssc.json file in the output directory.
During deployment of an Angular based app, the environment variables based on the variables from ngssc.json are inserted into the apps index.html (or defined index file). With version 15.0.0 the environment variable detection was widened to the entire project, relative to the angular.json file from the Angular CLI. In a monorepo setup, this could lead to environment variables intended for a backend/service to be detected and written to the ngssc.json, which would then be populated and exposed via index.html. This has NO IMPACT, in a plain Angular project that has no backend component. This vulnerability has been mitigated in version 15.1.0, by adding an option searchPattern which restricts the detection file range by default. As a workaround, manually edit or create ngssc.json or run script after ngssc.json generation.

Affected configurations

Vulners
NVD
Node
kyubisationangular_server_side_configurationRange15.0.015.1.0

CNA Affected

[
  {
    "vendor": "kyubisation",
    "product": "angular-server-side-configuration",
    "versions": [
      {
        "version": ">= 15.0.0, < 15.1.0",
        "status": "affected"
      }
    ]
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L

0.001 Low

EPSS

Percentile

49.1%

Related for CVE-2023-28444