Sha256: bd73a19fe468d0b3ef948ace973ef4619174aa1977f79c3b854f2c1b4a742c71

Contents?: true

Size: 965 Bytes

Versions: 1

Compression:

Stored size: 965 Bytes

Contents

---
gem: mapbox-rails
osvdb: 132871
url: https://nodesecurity.io/advisories/74
title: mapbox-rails Content Injection via TileJSON Name
date: 2016-01-12
description: |
  Mapbox.js versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 are vulnerable
  to a cross-site-scripting attack in certain uncommon usage scenarios.

  If you use L.mapbox.map and L.mapbox.shareControl it is possible for a
  malicious user with control over the TileJSON content to inject script
  content into the name value of the TileJSON. After clicking on the share
  control, the malicious code will execute in the context of the page using
  Mapbox.js.

  Such usage is uncommon. L.mapbox.shareControl is not automatically added to
  Mapbox.js maps and must be explicitly added. The following usage scenarios
  are not vulnerable:

  * the map does not use a share control (L.mapbox.sharecontrol)
  * only trusted TileJSON content is loaded

patched_versions:
  - '~> 1.6.6'
  - '>= 2.2.4'

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/mapbox-rails/OSVDB-132871.yml