This affects all versions of package osm-static-maps. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: snyk
Published: 2020-10-20T10:25:26.929315Z
Updated: 2024-09-16T16:28:47.401Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7749
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-10-20T11:15:12.660
Modified: 2024-11-21T05:37:43.837
Link: CVE-2020-7749
Redhat
No data.