Sha256: b644938079bd65919ac97f090c3fbe01c74a888553a3a8853b0d5ffbfbf7493f

Contents?: true

Size: 884 Bytes

Versions: 5

Compression:

Stored size: 884 Bytes

Contents

---
gem: mapbox-rails
osvdb: 129854
url: https://nodesecurity.io/advisories/49
title: mapbox-rails Content Injection via TileJSON attribute
date: 2015-10-24
description: |
  Mapbox.js versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 are vulnerable
  to a cross-site-scripting attack in certain uncommon usage scenarios.

  If you use L.mapbox.map or L.mapbox.tileLayer to load untrusted TileJSON
  content from a non-Mapbox URL, it is possible for a malicious user with
  control over the TileJSON content to inject script content into the
  "attribution" value of the TileJSON which will be executed in the context of
  the page using Mapbox.js.

  Such usage is uncommon. The following usage scenarios are not vulnerable:

  * only trusted TileJSON content is loaded
  * TileJSON content comes only from mapbox.com URLs
  * a Mapbox map ID is supplied, rather than a TileJSON URL

Version data entries

5 entries across 5 versions & 2 rubygems

Version Path
bundler-budit-0.6.2 data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml
bundler-audit-0.5.0 data/ruby-advisory-db/gems/mapbox-rails/OSVDB-129854.yml