Content Injection via TileJSON Name Affecting org.webjars.npm:mapbox.js package, versions [0,]


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.14% (51st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGWEBJARSNPM-1038247
  • published14 Jan 2016
  • disclosed12 Jan 2016
  • creditAbdullah (enderun07)

Introduced: 12 Jan 2016

CVE-2017-1000043  (opens in a new tab)
CWE-74  (opens in a new tab)

Overview

Mapbox.js is vulnerable to script content injection when L.mapbox.map and L.mapbox.shareControl is used to load untrusted TileJSON content from a non-Mapbox URL.

Details

Such usage is uncommon. The following usage scenarios are not vulnerable: [1]

  • the map does not use a share control (L.mapbox.sharecontrol)
  • only trusted TileJSON content is loaded

CVSS Scores

version 3.1