GMS-2016-69: Cross Site Scripting
If an attacker can trick an unsuspecting user into viewing a specially crafted plot on a site that uses plotly.js, then the attacker could potentially retrieve authentication tokens and perform actions on behalf of the user.
References
- help.plot.ly/security-advisories/2016-08-08-plotlyjs-xss-advisory/
- acloudtree.com/2016-08-09-how-i-hacked-plotly-by-exploiting-a-svg-vulnerability-in-plotlyjs/
- github.com/plotly/plotly.js/commit/0a1526de6ee872993cabac966ed6fdc67cd052f0
- github.com/plotly/plotly.js/commit/d58d3bee92cbed88e2da250753d7dcb374d42e1d
- github.com/plotly/plotly.js/issues/642
Detect and mitigate GMS-2016-69 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →