Content Injection via TileJSON Name Affecting mapbox-rails package, versions >= 0


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUBY-MAPBOXRAILS-20250
  • published11 Jan 2016
  • disclosed11 Jan 2016
  • creditAbdullah (enderun07)

Introduced: 11 Jan 2016

CVE NOT AVAILABLE CWE-74  (opens in a new tab)

Overview

mapbox-rails integrates mapbox.js with the Rails asset pipeline.

mapbox.js is vulnerable to script content injection when L.mapbox.map and L.mapbox.shareControl is used to load untrusted TileJSON content from a non-Mapbox URL.

Details

Such usage is uncommon. The following usage scenarios are not vulnerable: [1]

  • the map does not use a share control (L.mapbox.sharecontrol)
  • only trusted TileJSON content is loaded

Related vulnerability:

CVSS Scores

version 3.1