Bug 2417389 (CVE-2025-66035) - CVE-2025-66035 angular: Angular HTTP Client Has XSRF Token Leakage via Protocol-Relative URLs
Summary: CVE-2025-66035 angular: Angular HTTP Client Has XSRF Token Leakage via Protoc...
Keywords:
Status: NEW
Alias: CVE-2025-66035
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2419553 2419554 2419555 2419556 2419557 2419558 2419559 2419560 2419561 2419562 2419563 2419564 2419565 2419566 2419567 2419568 2419569 2419570 2419571 2419582 2419584 2419577 2419578 2419579 2419580 2419581 2419583 2419585
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-11-26 23:01 UTC by OSIDB Bzimport
Modified: 2025-12-11 10:28 UTC (History)
69 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-11-26 23:01:29 UTC
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Comment 4 Marcel Cornu 2025-12-11 10:28:55 UTC
This vulnerability is related to an Angular application located in the same Git repository as the pqos library and utilities. However, only the pqos library and utilities are included in the intel-cmt-cat Linux package, the Angular application is not included. So I believe this vulnerability does not affect the package.


Note You need to log in before you can comment on or make changes to this bug.