Content Injection via TileJSON attribute in mapbox.js
Moderate severity
GitHub Reviewed
Published
Nov 9, 2018
to the GitHub Advisory Database
•
Updated Mar 27, 2023
Description
Published by the National Vulnerability Database
Jul 17, 2017
Published to the GitHub Advisory Database
Nov 9, 2018
Reviewed
Jun 16, 2020
Last updated
Mar 27, 2023
Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of
mapbox.js
are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.If
L.mapbox.map
orL.mapbox.tileLayer
are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the TileJSON content to inject script content into the "attribution" value of the TileJSON which will be executed in the context of the page using Mapbox.js.Recommendation
Version 2.x: Update to version 2.1.7 or later.
Version 1.x: Update to version 1.6.5 or later.
References