Injection and Cross-site Scripting in osm-static-maps
High severity
GitHub Reviewed
Published
May 10, 2021
to the GitHub Advisory Database
•
Updated Sep 11, 2023
Description
Published by the National Vulnerability Database
Oct 20, 2020
Reviewed
Apr 21, 2021
Published to the GitHub Advisory Database
May 10, 2021
Last updated
Sep 11, 2023
This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping
({{{ ... }}})
. As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.References