Loading HuntDB...

Stored XSS from Display Settings triggered on Save and viewing realtime search demo

A
Algolia
Submitted None
Reported by ctee

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Here are the steps to trigger the XSS: 1. Create a JSON record that will contain the following attribute: **{"<img src=1 onerror=alert(document.domain)>": "XSS attribute"}** 2. Go to **Indices -> Display** and select the attribute **<img src=1 onerror=alert(document.domain)>** under **Attributes for Faceting** and click save. 3. Note that XSS is triggered multiple times on that page. 4. XSS is now triggered on **https://www.algolia.com/explorer#?index=index_name** as it also shows the attribute. 5. Create a public UI Demo and to the public url, xss is triggered. I've created a demo url: https://www.algolia.com/realtime-search-demo/xsstest

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic