Language:
https://docs.angularjs.org/guide/security
https://github.com/tijme/angularjs-csti-scanner
https://ryhanson.com/angular-expression-injection-walkthrough
https://ryhanson.com/stealing-session-tokens-on-plunker-with-an-angular-expression-injection
Severity: Medium
ID: 112684
Type: remote
Family: Injection
Published: 1/29/2021
Updated: 6/9/2023
Scan Template: full, pci, scan
Risk Factor: Medium
Score: 5.2
Risk Factor: High
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: Tenable
Risk Factor: High
Base Score: 7.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
CVSS Score Source: Tenable
Risk Factor: Medium
Base Score: 5.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
CVSS Score Source: Tenable
OWASP: 2021-A3
WASC: Improper Output Handling
DISA STIG: APSC-DV-002560
HIPAA: 164.306(a)(1), 164.306(a)(2)
ISO: 27001-A.14.2.5
NIST: sp800_53-SI-10
OWASP API: 2019-API8
OWASP ASVS: 4.0.2-5.2.1, 4.0.2-5.2.7