Skip to content

Angular critical CSS inlining Cross-site Scripting Vulnerability Advisory

High severity GitHub Reviewed Published Aug 8, 2023 in angular/universal • Updated Aug 18, 2023

Package

npm @nguniversal/common (npm)

Affected versions

>= 16.1.0, < 16.1.2

Patched versions

16.1.2

Description

Impact

Angular Universal applications on 16.1.0 and 16.1.1 using critical CSS inlining are vulnerable to a cross-site scripting (XSS) attack where an attacker can trick another user into visiting a page which injects malicious JavaScript.

Angular CLI applications without Universal do perform critical CSS inlining as well, however exploiting this requires a malicious actor to already have access to modify source code directly.

Patches

@nguniversal/common should be upgraded to 16.1.2 or higher. 16.2.0-rc.0 is safe.

Workarounds

The easiest solution is likely to upgrade Universal to 16.1.2 or downgrade to 16.0.x or lower. Alternatively you can override specifically the critters dependency with version 0.0.20 in your package.json.

{
  "overrides": {
    "critters": "0.0.20"
  }
}

References

References

@dgp1130 dgp1130 published to angular/universal Aug 8, 2023
Published to the GitHub Advisory Database Aug 9, 2023
Reviewed Aug 9, 2023
Last updated Aug 18, 2023

Severity

High

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-r3hf-q8q7-fv2p

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.