CVE-2023-28444

angular-server-side-configuration information disclosure vulnerability in monorepo with node.js backend

Description

angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during build time of an Angular CLI project. The detected environment variables are written to a ngssc.json file in the output directory. During deployment of an Angular based app, the environment variables based on the variables from ngssc.json are inserted into the apps index.html (or defined index file). With version 15.0.0 the environment variable detection was widened to the entire project, relative to the angular.json file from the Angular CLI. In a monorepo setup, this could lead to environment variables intended for a backend/service to be detected and written to the ngssc.json, which would then be populated and exposed via index.html. This has NO IMPACT, in a plain Angular project that has no backend component. This vulnerability has been mitigated in version 15.1.0, by adding an option `searchPattern` which restricts the detection file range by default. As a workaround, manually edit or create ngssc.json or run script after ngssc.json generation.

Category

9.9
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.06%
Third-Party Advisory github.com Third-Party Advisory github.com Third-Party Advisory github.com
Affected: kyubisation angular-server-side-configuration
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-28444?
CVE-2023-28444 has been scored as a critical severity vulnerability.
How to fix CVE-2023-28444?
To fix CVE-2023-28444, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-28444 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-28444 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-28444?
CVE-2023-28444 affects kyubisation angular-server-side-configuration.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.