This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
**Note:**
This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
References
| Link | Resource |
|---|---|
| https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 | Third Party Advisory |
| https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 | Third Party Advisory |
| https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 | Third Party Advisory |
| https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos | Exploit Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2025/07/msg00005.html | |
| https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 | Third Party Advisory |
| https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 | Third Party Advisory |
| https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 | Third Party Advisory |
| https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos | Exploit Third Party Advisory |
| https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS | Third Party Advisory |
Configurations
History
03 Nov 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 08:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 - Third Party Advisory | |
| References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 - Third Party Advisory | |
| References | () https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 - Third Party Advisory | |
| References | () https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos - Exploit, Third Party Advisory | |
| References | () https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS - Third Party Advisory |
10 Oct 2024, 13:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-6241746 - Third Party Advisory | |
| References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6241747 - Third Party Advisory | |
| References | () https://support.herodevs.com/hc/en-us/articles/25715686953485-CVE-2024-21490-AngularJS-Regular-Expression-Denial-of-Service-ReDoS - Third Party Advisory | |
| CPE | cpe:2.3:a:angularjs:angular.js:*:*:*:*:*:*:*:* | |
| First Time |
Angularjs angular.js
Angularjs |
14 May 2024, 14:54
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Mar 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service. **Note:** This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core). | |
| References |
|
16 Feb 2024, 13:42
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Angular angular
Angular |
|
| Summary |
|
|
| CPE | cpe:2.3:a:angular:angular:*:*:*:*:*:node.js:*:* | |
| References | () https://security.snyk.io/vuln/SNYK-JS-ANGULAR-6091113 - Third Party Advisory | |
| References | () https://stackblitz.com/edit/angularjs-vulnerability-ng-srcset-redos - Exploit, Third Party Advisory |
10 Feb 2024, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-10 05:15
Updated : 2025-11-03 20:16
NVD link : CVE-2024-21490
Mitre link : CVE-2024-21490
CVE.ORG link : CVE-2024-21490
JSON object : View
Products Affected
angularjs
- angular.js
CWE
CWE-1333
Inefficient Regular Expression Complexity
