mapbox-rails Content Injection via TileJSON Name
Mapbox.js versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 are vulnerable
to a cross-site-scripting attack in certain uncommon usage scenarios.
If you use L.mapbox.map and L.mapbox.shareControl it is possible for a
malicious user with control over the TileJSON content to inject script
content into the name value of the TileJSON. After clicking on the share
control, the malicious code will execute in the context of the page using
Such usage is uncommon. L.mapbox.shareControl is not automatically added to
Mapbox.js maps and must be explicitly added. The following usage scenarios
are not vulnerable:
* the map does not use a share control (L.mapbox.sharecontrol)
* only trusted TileJSON content is loaded
Am I vulnerable?
The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.
Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.Sign up for monitoring
Affected package information
|Package||Patched in||Unaffected in|