Vulnerability Details : CVE-2023-28444
angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during build time of an Angular CLI project. The detected environment variables are written to a ngssc.json file in the output directory. During deployment of an Angular based app, the environment variables based on the variables from ngssc.json are inserted into the apps index.html (or defined index file). With version 15.0.0 the environment variable detection was widened to the entire project, relative to the angular.json file from the Angular CLI. In a monorepo setup, this could lead to environment variables intended for a backend/service to be detected and written to the ngssc.json, which would then be populated and exposed via index.html. This has NO IMPACT, in a plain Angular project that has no backend component. This vulnerability has been mitigated in version 15.1.0, by adding an option `searchPattern` which restricts the detection file range by default. As a workaround, manually edit or create ngssc.json or run script after ngssc.json generation.
Vulnerability category: Information leak
Exploit prediction scoring system (EPSS) score for CVE-2023-28444
Probability of exploitation activity in the next 30 days: 0.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 46 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2023-28444
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
9.9
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L |
3.9
|
5.3
|
GitHub, Inc. |
CWE ids for CVE-2023-28444
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
-
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2023-28444
-
https://github.com/kyubisation/angular-server-side-configuration/releases/tag/v15.1.0
Release v15.1.0 · kyubisation/angular-server-side-configuration · GitHubThird Party Advisory
-
https://github.com/kyubisation/angular-server-side-configuration/commit/d701f51260637a84ede278e248934e0437a7ff86
feat: add searchPattern as an option and restrict default search patt… · kyubisation/angular-server-side-configuration@d701f51 · GitHubPatch;Third Party Advisory
-
https://github.com/kyubisation/angular-server-side-configuration/security/advisories/GHSA-gwvm-vrp4-4pp5
angular-server-side-configuration information disclosure vulnerability in monorepo with node.js backend · Advisory · kyubisation/angular-server-side-configuration · GitHubThird Party Advisory
Products affected by CVE-2023-28444
- Angular-server-side-configuration Project » Angular-server-side-configurationVersions from including (>=) 15.0.0 and before (<) 15.1.0cpe:2.3:a:angular-server-side-configuration_project:angular-server-side-configuration:*:*:*:*:*:*:*:*