chore(deps): update dependency @angular/ssr to v19.2.18 [security] #20806
+99
−9
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
19.2.16
->19.2.18
Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2025-62427
Impact
The vulnerability is a Server-Side Request Forgery (SSRF) flaw within the URL resolution mechanism of Angular's Server-Side Rendering package (
@angular/ssr
).The function
createRequestUrl
uses the nativeURL
constructor. When an incoming request path (e.g.,originalUrl
orurl
) begins with a double forward slash (//
) or backslash (\\
), theURL
constructor treats it as a schema-relative URL. This behavior overrides the security-intended base URL (protocol, host, and port) supplied as the second argument, instead resolving the URL against the scheme of the base URL but adopting the attacker-controlled hostname.This allows an attacker to specify an external domain in the URL path, tricking the Angular SSR environment into setting the page's virtual location (accessible via
DOCUMENT
orPlatformLocation
tokens) to this attacker-controlled domain. Any subsequent relative HTTP requests made during the SSR process (e.g., usingHttpClient.get('assets/data.json')
) will be incorrectly resolved against the attacker's domain, forcing the server to communicate with an arbitrary external endpoint.Exploit Scenario
A request to
http://localhost:4200//attacker-domain.com/some-page
causes Angular to believe the host is attacker-domain.com. A relative request to api/data then becomes a server-side request tohttp://attacker-domain.com/api/data
.Patches
@angular/ssr
19.2.18@angular/ssr
20.3.6@angular/ssr
21.0.0-next.8Mitigation
The application's internal location must be robustly determined from the incoming request. The fix requires sanitizing or validating the request path to prevent it from being interpreted as a schema-relative URL (i.e., ensuring it does not start with
//
).Server-Side Middleware
If you can't upgrade to a patched version, implement a middleware on the Node.js/Express server that hosts the Angular SSR application to explicitly reject or sanitize requests where the path begins with a double slash (
//
).Example (Express/Node.js):
References
Release Notes
angular/angular-cli (@angular/ssr)
v19.2.18
Compare Source
v19.2.17
Compare Source
@angular/build
vite
to6.3.6
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Never, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.
Managed by the SAP Open Source Program Office. For questions/issues please raise an issue in the renovate-controller repository.