Skip to content

Conversation

@JorisLambrechts
Copy link

We recently noticed a xss attempt using the following url:
solr-search?q=&facet=itemtype:%22New%3Cimg%20src=x%20onerror=alert(document.domain)%3E%22

They used inline javascript in a img-tag in the facet part of the query url.

These facet values aren't sanitized at the moment and are being displayed here:
https://github.com/biblibre/omeka-plugin-SolrSearch/blob/bf1e4b2403d1d998854427e31ebc73ecc7e4d9e4/views/shared/results/index.php#L45

This pr adds adds htmlspecialchars and strip_tags to sanitize the facet values in the function parseFacets

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant