CVE-2017-1000043 – mapbox-rails
Package
Manager: gem
Name: mapbox-rails
Vulnerable Version: >=1.0.0 <1.6.6 || >=2.0.0 <2.2.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00164 pctl0.37837
Details
Content Injection via TileJSON Name in mapbox.js Versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios. If `L.mapbox.map` or `L.mapbox.shareControl` are used in a manner that gives users control of the TileJSON content, it is possible to inject script content into the name value of the TileJSON. After clicking on the share control, the malicious code will execute in the context of the page using Mapbox.js. ## Recommendation Version 1.x: Update to version 1.6.6 or later. Version 2.x: Update to version 2.2.4 or later.
Metadata
Created: 2018-11-09T17:48:34Z
Modified: 2023-03-27T22:19:37Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/11/GHSA-q69p-5h74-w36f/GHSA-q69p-5h74-w36f.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-q69p-5h74-w36f
Finding: F008
Auto approve: 1