Content Injection via TileJSON attribute Affecting org.webjars.npm:mapbox.js package, versions [0,]


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGWEBJARSNPM-1038246
  • published6 Nov 2015
  • disclosed24 Oct 2015
  • creditJuan Broullón

Introduced: 24 Oct 2015

CVE-2017-1000042  (opens in a new tab)
CWE-74  (opens in a new tab)

Overview

Mapbox.js is vulnerable to script content injection when L.mapbox.map or L.mapbox.tileLayer is used to load untrusted TileJSON content from a non-Mapbox URL.

Details

Such usage is uncommon. The following usage scenarios are not vulnerable: [1]

  • only trusted TileJSON content is loaded
  • TileJSON content comes only from mapbox.com URLs
  • a Mapbox map ID is supplied, rather than a TileJSON URL

CVSS Scores

version 4.0
version 3.1