chore(deps): update dependency @angular/ssr to v20.3.21 [security] - autoclosed#124
Closed
renovate[bot] wants to merge 1 commit intomainfrom
Closed
chore(deps): update dependency @angular/ssr to v20.3.21 [security] - autoclosed#124renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
ac13ac3 to
88f3f4d
Compare
88f3f4d to
222227e
Compare
222227e to
c5192b4
Compare
c5192b4 to
7efed4a
Compare
7efed4a to
f135233
Compare
f135233 to
1dac423
Compare
1dac423 to
fb2de1a
Compare
fb2de1a to
d35f276
Compare
22bc503 to
288c28c
Compare
288c28c to
5ebc40e
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
20.1.2→20.3.21GitHub Vulnerability Alerts
CVE-2025-59052
Impact
Angular uses a DI container (the "platform injector") to hold request-specific state during server-side rendering. For historical reasons, the container was stored as a JavaScript module-scoped global variable. When multiple requests are processed concurrently, they could inadvertently share or overwrite the global injector state.
In practical terms, this can lead to one request responding with data meant for a completely different request, leaking data or tokens included on the rendered page or in response headers. As long as an attacker had network access to send any traffic that received a rendered response, they may have been able to send a large number of requests and then inspect the responses for information leaks.
The following APIs were vulnerable and required SSR-only breaking changes:
bootstrapApplication: This function previously implicitly retrieved the last platform injector that was created. It now requires an explicitBootstrapContextin a server environment. This function is only used for standalone applications. NgModule-based applications are not affected.getPlatform: This function previously returned the last platform instance that was created. It now always returnsnullin a server environment.destroyPlatform: This function previously destroyed the last platform instance that was created. It's now a no-op when called in a server environment.For
bootstrapApplication, the framework now provides a new argument to the application's bootstrap function:As is usually the case for changes to Angular, an automatic schematic will take care of these code changes as part of ng update:
The schematic can also be invoked explicitly if the version bump was pulled in independently:
For applications that still use
CommonEngine, thebootstrapproperty inCommonEngineOptionsalso gains the samecontextargument in the patched versions of Angular.In local development (
ng serve), Angular CLI triggered a codepath for Angular's "JIT" feature on the server even in applications that weren't using it in the browser. The codepath introduced async behavior between platform creation and application bootstrap, triggering the race condition even if an application didn't explicitly usegetPlatformor custom async logic inbootstrap. Angular applications should never run in this mode outside of local development.Patches
The issue has been patched in all active release lines as well as in the v21 prerelease:
@angular/platform-server: 21.0.0-next.3@angular/platform-server: 20.3.0@angular/platform-server: 19.2.15@angular/platform-server:18.2.14@angular/ssr: 21.0.0-next.3@angular/ssr: 20.3.0@angular/ssr: 19.2.16@angular/ssr: 18.2.21Workarounds
bootstrapfunctions.getPlatform()in application code.ngJitModeas false.References
CVE-2025-62427
Impact
The vulnerability is a Server-Side Request Forgery (SSRF) flaw within the URL resolution mechanism of Angular's Server-Side Rendering package (
@angular/ssr).The function
createRequestUrluses the nativeURLconstructor. When an incoming request path (e.g.,originalUrlorurl) begins with a double forward slash (//) or backslash (\\), theURLconstructor treats it as a schema-relative URL. This behavior overrides the security-intended base URL (protocol, host, and port) supplied as the second argument, instead resolving the URL against the scheme of the base URL but adopting the attacker-controlled hostname.This allows an attacker to specify an external domain in the URL path, tricking the Angular SSR environment into setting the page's virtual location (accessible via
DOCUMENTorPlatformLocationtokens) to this attacker-controlled domain. Any subsequent relative HTTP requests made during the SSR process (e.g., usingHttpClient.get('assets/data.json')) will be incorrectly resolved against the attacker's domain, forcing the server to communicate with an arbitrary external endpoint.Exploit Scenario
A request to
http://localhost:4200//attacker-domain.com/some-pagecauses Angular to believe the host is attacker-domain.com. A relative request to api/data then becomes a server-side request tohttp://attacker-domain.com/api/data.Patches
@angular/ssr19.2.18@angular/ssr20.3.6@angular/ssr21.0.0-next.8Mitigation
The application's internal location must be robustly determined from the incoming request. The fix requires sanitizing or validating the request path to prevent it from being interpreted as a schema-relative URL (i.e., ensuring it does not start with
//).Server-Side Middleware
If you can't upgrade to a patched version, implement a middleware on the Node.js/Express server that hosts the Angular SSR application to explicitly reject or sanitize requests where the path begins with a double slash (
//).Example (Express/Node.js):
References
CVE-2026-27738
An Open Redirect vulnerability exists in the internal URL processing logic in Angular SSR. The logic normalizes URL segments by stripping leading slashes; however, it only removes a single leading slash.
When an Angular SSR application is deployed behind a proxy that passes the
X-Forwarded-Prefixheader, an attacker can provide a value starting with three slashes (e.g.,///evil.com).redirectToor i18n locale switch).///evil.comas the prefix.//evil.com.Locationheader.//as a protocol-relative URL, redirecting the user fromhttps://your-app.comtohttps://evil.com.Impact
This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking:
Attack Preconditions
X-Forwarded-Prefixheader to the SSR process without sanitization.X-Forwarded-Prefixheader.Patches
Workarounds
Until the patch is applied, developers should sanitize the
X-Forwarded-Prefixheader in theirserver.tsbefore the Angular engine processes the request:Resources
CVE-2026-27739
A Server-Side Request Forgery (SSRF) vulnerability has been identified in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and
X-Forwarded-*family to determine the application's base origin without any validation of the destination domain.Specifically, the framework didn't have checks for the following:
HostandX-Forwarded-Hostheaders were not checked to belong to a trusted origin. This allows an attacker to redefine the "base" of the application to an arbitrary external domain.X-Forwarded-Hostheader was not checked for path segments or special characters, allowing manipulation of the base path for all resolved relative URLs.X-Forwarded-Portheader was not verified as numeric, leading to malformed URI construction or injection attacks.This vulnerability manifests in two primary ways:
HttpClientresolves relative URLs against this unvalidated and potentially malformed base origin. An attacker can "steer" these requests to an external server or internal service.REQUESTobject to manually construct URLs (for fetch or third-party SDKs) directly inherit these unsanitized values. By accessing theHost/X-Forwarded-*headers, the application logic may perform requests to attacker-controlled destinations or malformed endpoints.Impact
When successfully exploited, this vulnerability allows for arbitrary internal request steering. This can lead to:
Authorizationheaders or session cookies by redirecting them to an attacker's server.169.254.169.254) not exposed to the public internet.Attack Preconditions
HttpClientrequests using relative URLs OR manually construct URLs using the unvalidatedHost/X-Forwarded-*headers using theREQUESTobject.Patches
Workarounds
req.headersfor URL construction. Instead, use trusted variables for your base API paths.server.tsto enforce numeric ports and validated hostnames.References
CVE-2026-33397
An Open Redirect vulnerability exists in
@angular/ssrdue to an incomplete fix for CVE-2026-27738. While the original fix successfully blocked multiple leading slashes (e.g.,///), the internal validation logic fails to account for a single backslash (\) bypass.When an Angular SSR application is deployed behind a proxy that passes the
X-Forwarded-Prefixheader:\evil.com).Locationheader containing/\evil.com./\sequence as//, treating it as a protocol-relative URL and redirecting the user to the attacker-controlled domain.Furthermore, the response lacks the
Vary: X-Forwarded-Prefixheader, allowing the malicious redirect to be stored in intermediate caches (Web Cache Poisoning).Impact
This vulnerability allows attackers to conduct large-scale phishing and SEO hijacking:
Patches
Workarounds
Until the patch is applied, developers should sanitize the
X-Forwarded-Prefixheader in theirserver.tsbefore the Angular engine processes the request:References
Release Notes
angular/angular-cli (@angular/ssr)
v20.3.21: 20.3.21Compare Source
@angular/ssr
v20.3.20Compare Source
@angular/build
v20.3.19Compare Source
@angular-devkit/build-angular
v20.3.18Compare Source
@angular-devkit/core
ajvto8.18.0@angular/build
v20.3.17Compare Source
@angular/ssr
v20.3.16Compare Source
@angular/cli
v20.3.15Compare Source
@angular/cli
@angular-devkit/build-angular
v20.3.14Compare Source
@angular/cli
v20.3.13Compare Source
@angular/cli
@modelcontextprotocol/sdkto v1.24.0v20.3.12Compare Source
@angular/build
@angular/ssr
X-Forwarded-PrefixandAPP_BASE_HREFin redirectsv20.3.11Compare Source
@angular/build
ɵgetOrCreateAngularServerAppis always defined after errorsv20.3.10Compare Source
@schematics/angular
tsconfig.spec.jsoninclude for spec files@angular/build
@angular/localizewhen having external packages (#31721)v20.3.9Compare Source
@angular/ssr
v20.3.8Compare Source
@angular-devkit/build-angular
@angular/build
v20.3.7Compare Source
@angular-devkit/schematics
--forceoption when schematic containshost.create@angular/build
viteto7.11.1@angular/ssr
v20.3.6Compare Source
@angular/ssr
v20.3.5Compare Source
@angular/build
v20.3.4Compare Source
@schematics/angular
process.env['pm_id']@angular-devkit/build-angular
InjectionTokenas pure for improved tree-shaking@angular/build
InjectionTokenas pure for improved tree-shakingv20.3.3Compare Source
@schematics/angular
__screenshots__/to.gitignore@angular/ssr
v20.3.2Compare Source
v20.3.1Compare Source
@angular/build
7.1.5v20.3.0Compare Source
Breaking Changes
@angular/ssr
The server-side bootstrapping process has been changed to eliminate the reliance on a global platform injector.
Before:
After:
@schematics/angular
@angular/cli
@angular-devkit/build-angular
@angular/build
@angular/ssr
v20.2.2Compare Source
@angular/cli
@angular/build
v20.2.1Compare Source
@angular/cli
@schematics/angular
@angular-devkit/schematics-cli
@angular/build
v20.2.0Compare Source
@angular/cli
@schematics/angular
@angular-devkit/schematics
@angular/build
v20.1.6Compare Source
@schematics/angular
typeSeparatorin the library schematicv20.1.5Compare Source
@angular/cli
v20.1.4Compare Source
@angular/cli
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.