mapbox-rails Content Injection via TileJSON Name


2017-04-01 19:11
2017-01-05 20:15


Mapbox.js versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 are vulnerable
to a cross-site-scripting attack in certain uncommon usage scenarios.

If you use and L.mapbox.shareControl it is possible for a
malicious user with control over the TileJSON content to inject script
content into the name value of the TileJSON. After clicking on the share
control, the malicious code will execute in the context of the page using

Such usage is uncommon. L.mapbox.shareControl is not automatically added to
Mapbox.js maps and must be explicitly added. The following usage scenarios
are not vulnerable:

* the map does not use a share control (L.mapbox.sharecontrol)
* only trusted TileJSON content is loaded

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Package Patched in Unaffected in
mapbox-rails None None