Content Injection via TileJSON Name in mapbox.js
Moderate severity
GitHub Reviewed
Published
Nov 9, 2018
to the GitHub Advisory Database
•
Updated Mar 27, 2023
Description
Published by the National Vulnerability Database
Jul 17, 2017
Published to the GitHub Advisory Database
Nov 9, 2018
Reviewed
Jun 16, 2020
Last updated
Mar 27, 2023
Versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 of
mapbox.js
are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.If
L.mapbox.map
orL.mapbox.shareControl
are used in a manner that gives users control of the TileJSON content, it is possible to inject script content into the name value of the TileJSON. After clicking on the share control, the malicious code will execute in the context of the page using Mapbox.js.Recommendation
Version 1.x: Update to version 1.6.6 or later.
Version 2.x: Update to version 2.2.4 or later.
References