GHSA-pxcf-v868-m492

Suggest an improvement
Source
https://github.com/advisories/GHSA-pxcf-v868-m492
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/05/GHSA-pxcf-v868-m492/GHSA-pxcf-v868-m492.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pxcf-v868-m492
Aliases
  • CVE-2020-7749
Published
2021-05-10T18:43:45Z
Modified
2023-11-08T04:04:08.317718Z
Severity
  • 7.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L CVSS Calculator
Summary
Injection and Cross-site Scripting in osm-static-maps
Details

This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.

Database specific
{
    "github_reviewed_at": "2021-04-21T18:16:30Z",
    "cwe_ids": [
        "CWE-74",
        "CWE-79"
    ],
    "nvd_published_at": "2020-10-20T11:15:00Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / osm-static-maps

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9.0