chore(deps): update dependency @angular/ssr to v21.2.9 [security]#21453
Draft
renovate[bot] wants to merge 1 commit into
Draft
chore(deps): update dependency @angular/ssr to v21.2.9 [security]#21453renovate[bot] wants to merge 1 commit into
renovate[bot] wants to merge 1 commit into
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
21.2.8→21.2.9Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Angular SSR has Open Redirect and Request Steering via Encoded X-Forwarded-Prefix
CVE-2026-44437 / GHSA-69xr-m8h6-h664
More information
Details
Description
A vulnerability exists in the
X-Forwarded-Prefixheader processing logic within Angular SSR. The internal validation mechanism fails to properly account for URL-encoded characters, specifically dots (%2e%2e). This allows an attacker to bypass security filters by injecting encoded path traversal sequences that are later decoded and utilized by the application logic.When an Angular SSR application is configured to trust proxy headers and is deployed behind a proxy that forwards the
X-Forwarded-Prefixheader without prior sanitization, an attacker can provide a payload such as/%2e%2e/evil.The vulnerability manifests in two ways:
redirectTo). The decoded traversal payload manipulates the Location header, forcing the browser to an unintended path or external domain.HttpClientrequests. This causes the server to make requests to unintended internal paths or external endpoints.Attack Preconditions
HttpClientrequests.X-Forwarded-Prefixheader to the SSR process without stripping or sanitizing it.Workarounds
Until the patch is applied, developers should manually sanitize the
X-Forwarded-Prefixheader in theirserver.ts. The workaround involves decoding the component to catch encoded traversal attempts before normalization:Configuring Trusted Proxy Headers
By default, Angular ignores all X-Forwarded-* headers. If your application is behind a trusted reverse proxy (like a load balancer) that sets these headers, you can configure Angular to trust them.
You can configure trustProxyHeaders when initializing the application engine:
Patches
Resources
Severity
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:NReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
angular/angular-cli (@angular/ssr)
v21.2.9Compare Source
@angular/cli
@schematics/angular
@angular/ssr
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Never, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.
Managed by the SAP Open Source Program Office. For questions/issues please raise an issue in the renovate-controller repository.