Content Injection via TileJSON attribute Affecting mapbox-rails package, versions >= 0


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-MAPBOXRAILS-20241
  • published23 Oct 2015
  • disclosed23 Oct 2015
  • creditJuan Broullón

Introduced: 23 Oct 2015

CVE NOT AVAILABLE CWE-74  (opens in a new tab)

Overview

mapbox-rails integrates mapbox.js with the Rails asset pipeline.

mapbox.js is vulnerable to script content injection when L.mapbox.map or L.mapbox.tileLayer is used to load untrusted TileJSON content from a non-Mapbox URL.

Details

Such usage is uncommon. The following usage scenarios are not vulnerable: [1]

  • only trusted TileJSON content is loaded
  • TileJSON content comes only from mapbox.com URLs
  • a Mapbox map ID is supplied, rather than a TileJSON URL

CVSS Scores

version 3.1