Update dependency @angular/ssr to v19 [SECURITY]#56
Open
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
Open
Update dependency @angular/ssr to v19 [SECURITY]#56renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
renovate-bot wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
Conversation
|
18ace17 to
6cdbf26
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^17.0.3→^19.0.0GitHub Vulnerability Alerts
CVE-2025-59052
Impact
Angular uses a DI container (the "platform injector") to hold request-specific state during server-side rendering. For historical reasons, the container was stored as a JavaScript module-scoped global variable. When multiple requests are processed concurrently, they could inadvertently share or overwrite the global injector state.
In practical terms, this can lead to one request responding with data meant for a completely different request, leaking data or tokens included on the rendered page or in response headers. As long as an attacker had network access to send any traffic that received a rendered response, they may have been able to send a large number of requests and then inspect the responses for information leaks.
The following APIs were vulnerable and required SSR-only breaking changes:
bootstrapApplication: This function previously implicitly retrieved the last platform injector that was created. It now requires an explicitBootstrapContextin a server environment. This function is only used for standalone applications. NgModule-based applications are not affected.getPlatform: This function previously returned the last platform instance that was created. It now always returnsnullin a server environment.destroyPlatform: This function previously destroyed the last platform instance that was created. It's now a no-op when called in a server environment.For
bootstrapApplication, the framework now provides a new argument to the application's bootstrap function:As is usually the case for changes to Angular, an automatic schematic will take care of these code changes as part of ng update:
The schematic can also be invoked explicitly if the version bump was pulled in independently:
For applications that still use
CommonEngine, thebootstrapproperty inCommonEngineOptionsalso gains the samecontextargument in the patched versions of Angular.In local development (
ng serve), Angular CLI triggered a codepath for Angular's "JIT" feature on the server even in applications that weren't using it in the browser. The codepath introduced async behavior between platform creation and application bootstrap, triggering the race condition even if an application didn't explicitly usegetPlatformor custom async logic inbootstrap. Angular applications should never run in this mode outside of local development.Patches
The issue has been patched in all active release lines as well as in the v21 prerelease:
@angular/platform-server: 21.0.0-next.3@angular/platform-server: 20.3.0@angular/platform-server: 19.2.15@angular/platform-server:18.2.14@angular/ssr: 21.0.0-next.3@angular/ssr: 20.3.0@angular/ssr: 19.2.16@angular/ssr: 18.2.21Workarounds
bootstrapfunctions.getPlatform()in application code.ngJitModeas false.References
CVE-2026-27739
A Server-Side Request Forgery (SSRF) vulnerability has been identified in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and
X-Forwarded-*family to determine the application's base origin without any validation of the destination domain.Specifically, the framework didn't have checks for the following:
HostandX-Forwarded-Hostheaders were not checked to belong to a trusted origin. This allows an attacker to redefine the "base" of the application to an arbitrary external domain.X-Forwarded-Hostheader was not checked for path segments or special characters, allowing manipulation of the base path for all resolved relative URLs.X-Forwarded-Portheader was not verified as numeric, leading to malformed URI construction or injection attacks.This vulnerability manifests in two primary ways:
HttpClientresolves relative URLs against this unvalidated and potentially malformed base origin. An attacker can "steer" these requests to an external server or internal service.REQUESTobject to manually construct URLs (for fetch or third-party SDKs) directly inherit these unsanitized values. By accessing theHost/X-Forwarded-*headers, the application logic may perform requests to attacker-controlled destinations or malformed endpoints.Impact
When successfully exploited, this vulnerability allows for arbitrary internal request steering. This can lead to:
Authorizationheaders or session cookies by redirecting them to an attacker's server.169.254.169.254) not exposed to the public internet.Attack Preconditions
HttpClientrequests using relative URLs OR manually construct URLs using the unvalidatedHost/X-Forwarded-*headers using theREQUESTobject.Patches
Workarounds
req.headersfor URL construction. Instead, use trusted variables for your base API paths.server.tsto enforce numeric ports and validated hostnames.References
Release Notes
angular/angular-cli (@angular/ssr)
v19.2.21Compare Source
@angular/ssr
v19.2.20Compare Source
@angular-devkit/build-angular
v19.2.19Compare Source
@angular/build
v19.2.18Compare Source
@angular/ssr
v19.2.17Compare Source
@angular/build
viteto6.3.6v19.2.16Compare Source
Breaking Changes
@angular/ssr
The server-side bootstrapping process has been changed to eliminate the reliance on a global platform injector.
Before:
After:
@angular-devkit/build-angular
@angular/build
@angular/ssr
v19.2.15Compare Source
@angular-devkit/build-angular
v19.2.14Compare Source
@angular/build
v19.2.13Compare Source
@angular/pwa
background_colorandtheme_colorfrom manifestv19.2.12Compare Source
@angular/cli
require()errors with ESM modulesv19.2.11Compare Source
@angular-devkit/build-angular
@angular/build
v19.2.10Compare Source
@angular/build
v19.2.9Compare Source
@angular-devkit/build-angular
@angular/build
preserveSymlinksoption to Karma esbuild builder@angular/ssr
getPrerenderParamsfor wildcard routesv19.2.8Compare Source
@angular/build
modulevalue check when adding custom conditionsv19.2.7Compare Source
@angular/build
v19.2.6Compare Source
@angular-devkit/schematics
@angular/build
falsevalue in server optionv19.2.5Compare Source
@angular/build
getOrCreateAngularServerAppduring error compilationv19.2.4Compare Source
@schematics/angular
@angular/platform-browser-dynamicwith@angular/platform-browser@angular/build
v19.2.3Compare Source
@angular/build
v19.2.2Compare Source
@angular/cli
@angular/build
extract-i18ndoes not respect@angular/ssr
writedoes not return a booleanv19.2.1Compare Source
@angular/ssr
v19.2.0Compare Source
@schematics/angular
@angular-devkit/build-angular
@angular/build
allowedHostsoption for development server@angular/ssr
v19.1.9Compare Source
@angular/build
v19.1.8Compare Source
@angular/cli
@angular-devkit/build-angular
@angular/build
/index.htmlrequestsautoCspv19.1.7Compare Source
@schematics/angular
@angular/build
--localize@angular/ssr
\r\nv19.1.6Compare Source
@schematics/angular
@angular/ssris not a dependency@angular/build
@angular/ssr
v19.1.5Compare Source
@schematics/angular
@angular-devkit/build-angular:ng-packagr@angular/build
removeCommentsoption@angular/ssr
provideServerRoutesConfigtoprovideServerRoutingv19.1.4Compare Source
@angular-devkit/schematics
@angular/build
/@​ng/componentson WindowssubPathswith inlined localesi18n.baseHrefwith a warning@angular/ssr
withEnabledBlockingInitialNavigationv19.1.3Compare Source
@angular/build
@ng/components$localizeusagev19.1.2Compare Source
@angular/build
v19.1.1Compare Source
@angular/build
| Commit
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.