Stored XSS from Display Settings triggered on Save and viewing realtime search demo
A
Algolia
Submitted None
Actions:
Reported by
ctee
Vulnerability Details
Technical details and impact analysis
Here are the steps to trigger the XSS:
1. Create a JSON record that will contain the following attribute:
**{"<img src=1 onerror=alert(document.domain)>": "XSS attribute"}**
2. Go to **Indices -> Display** and select the attribute **<img src=1 onerror=alert(document.domain)>** under **Attributes for Faceting** and click save.
3. Note that XSS is triggered multiple times on that page.
4. XSS is now triggered on **https://www.algolia.com/explorer#?index=index_name** as it also shows the attribute.
5. Create a public UI Demo and to the public url, xss is triggered. I've created a demo url: https://www.algolia.com/realtime-search-demo/xsstest
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Generic